SlideShare a Scribd company logo
1 of 1
Download to read offline
Two types of malware :-
1. Virus: A virus is a contagious program or code that attaches itself to another piece of software,
and then reproduces itself when that software is run. Most often this is spread by sharing
software or files between computers.
Virus cannot be spread without a human action. So when you share infected files or send email
with viruses as attachment in email, virus spread in another system also.
If you have turned off your anti-virus protection your system is vulnerable to virus and other
threats.
2. Trojan: This is the most dangerous Malware. Trojans are written with the purpose of
discovering your financial information, taking over your computer’s system resources, and in
larger systems creating a “denial-of-service attack ”.
Denial-of-service attack: an attempt to make a machine or network resource unavailable to those
attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
70% malware are trojan horse. When you open a file that have trojan horse or other kind of
unscrupulous virus program then it replicate in your system and your system is also get infected.
Solution
Two types of malware :-
1. Virus: A virus is a contagious program or code that attaches itself to another piece of software,
and then reproduces itself when that software is run. Most often this is spread by sharing
software or files between computers.
Virus cannot be spread without a human action. So when you share infected files or send email
with viruses as attachment in email, virus spread in another system also.
If you have turned off your anti-virus protection your system is vulnerable to virus and other
threats.
2. Trojan: This is the most dangerous Malware. Trojans are written with the purpose of
discovering your financial information, taking over your computer’s system resources, and in
larger systems creating a “denial-of-service attack ”.
Denial-of-service attack: an attempt to make a machine or network resource unavailable to those
attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
70% malware are trojan horse. When you open a file that have trojan horse or other kind of
unscrupulous virus program then it replicate in your system and your system is also get infected.

More Related Content

Similar to Two types of malware -1. Virus A virus is a contagious program o.pdf

There are many types of malwares like Trojans, viruses, worms, rootk.pdf
There are many types of malwares like Trojans, viruses, worms, rootk.pdfThere are many types of malwares like Trojans, viruses, worms, rootk.pdf
There are many types of malwares like Trojans, viruses, worms, rootk.pdfannaindustries
 
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...Infosec train
 
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...InfosecTrain Education
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101Atuk4
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 

Similar to Two types of malware -1. Virus A virus is a contagious program o.pdf (20)

There are many types of malwares like Trojans, viruses, worms, rootk.pdf
There are many types of malwares like Trojans, viruses, worms, rootk.pdfThere are many types of malwares like Trojans, viruses, worms, rootk.pdf
There are many types of malwares like Trojans, viruses, worms, rootk.pdf
 
Computervirus
ComputervirusComputervirus
Computervirus
 
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
 
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
 
Trojan Viruses
Trojan VirusesTrojan Viruses
Trojan Viruses
 
trojan virus.pdf
trojan virus.pdftrojan virus.pdf
trojan virus.pdf
 
Trojan Viruses.pdf
Trojan Viruses.pdfTrojan Viruses.pdf
Trojan Viruses.pdf
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 

More from arwholesalelors

Algebra, branch of mathematics in which arithmetical operations and .pdf
Algebra, branch of mathematics in which arithmetical operations and .pdfAlgebra, branch of mathematics in which arithmetical operations and .pdf
Algebra, branch of mathematics in which arithmetical operations and .pdfarwholesalelors
 
AccuracyData accuracy mentions to the degree with which data prop.pdf
AccuracyData accuracy mentions to the degree with which data prop.pdfAccuracyData accuracy mentions to the degree with which data prop.pdf
AccuracyData accuracy mentions to the degree with which data prop.pdfarwholesalelors
 
#include algorithm #include vector #include iostream usi.pdf
#include algorithm #include vector #include iostream usi.pdf#include algorithm #include vector #include iostream usi.pdf
#include algorithm #include vector #include iostream usi.pdfarwholesalelors
 
A) I will look for LP (limited partner) such as Yale Investment fund.pdf
A) I will look for LP (limited partner) such as Yale Investment fund.pdfA) I will look for LP (limited partner) such as Yale Investment fund.pdf
A) I will look for LP (limited partner) such as Yale Investment fund.pdfarwholesalelors
 
1. The Kepler space telescope detects planets and planet candidates .pdf
1. The Kepler space telescope detects planets and planet candidates .pdf1. The Kepler space telescope detects planets and planet candidates .pdf
1. The Kepler space telescope detects planets and planet candidates .pdfarwholesalelors
 
1. When cell in S phase is fused with cell in G1 phase, the cell of .pdf
1. When cell in S phase is fused with cell in G1 phase, the cell of .pdf1. When cell in S phase is fused with cell in G1 phase, the cell of .pdf
1. When cell in S phase is fused with cell in G1 phase, the cell of .pdfarwholesalelors
 
1. A Holds individuals accountable for their actions.2. E. A,B and.pdf
1. A Holds individuals accountable for their actions.2. E. A,B and.pdf1. A Holds individuals accountable for their actions.2. E. A,B and.pdf
1. A Holds individuals accountable for their actions.2. E. A,B and.pdfarwholesalelors
 
EtSH is the strongest acid, so EtS- is the weakest conjugate base. .pdf
  EtSH is the strongest acid, so EtS- is the weakest conjugate base.  .pdf  EtSH is the strongest acid, so EtS- is the weakest conjugate base.  .pdf
EtSH is the strongest acid, so EtS- is the weakest conjugate base. .pdfarwholesalelors
 
Particulars Amount $ Share Holders Funds Com.pdf
     Particulars  Amount $          Share Holders Funds            Com.pdf     Particulars  Amount $          Share Holders Funds            Com.pdf
Particulars Amount $ Share Holders Funds Com.pdfarwholesalelors
 
The Nitro group is electron withdrawing, and ther.pdf
                     The Nitro group is electron withdrawing, and ther.pdf                     The Nitro group is electron withdrawing, and ther.pdf
The Nitro group is electron withdrawing, and ther.pdfarwholesalelors
 
The Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfThe Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfarwholesalelors
 
You are asked to determine DNA content of a liver tissue. Describe h.pdf
You are asked to determine DNA content of a liver tissue. Describe h.pdfYou are asked to determine DNA content of a liver tissue. Describe h.pdf
You are asked to determine DNA content of a liver tissue. Describe h.pdfarwholesalelors
 
when we draw a vertical line it will cross the graph twice(that is m.pdf
when we draw a vertical line it will cross the graph twice(that is m.pdfwhen we draw a vertical line it will cross the graph twice(that is m.pdf
when we draw a vertical line it will cross the graph twice(that is m.pdfarwholesalelors
 
We Know that      Baking powder and Baking soda isused as a leave.pdf
We Know that      Baking powder and Baking soda isused as a leave.pdfWe Know that      Baking powder and Baking soda isused as a leave.pdf
We Know that      Baking powder and Baking soda isused as a leave.pdfarwholesalelors
 
The fallowing program shows the simple transformation #define GLEW.pdf
The fallowing program shows the simple transformation #define GLEW.pdfThe fallowing program shows the simple transformation #define GLEW.pdf
The fallowing program shows the simple transformation #define GLEW.pdfarwholesalelors
 
TlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdf
TlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdfTlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdf
TlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdfarwholesalelors
 
The cells of the reproductive organs (Eg ovaries ad testes) undergo.pdf
The cells of the reproductive organs (Eg ovaries ad testes) undergo.pdfThe cells of the reproductive organs (Eg ovaries ad testes) undergo.pdf
The cells of the reproductive organs (Eg ovaries ad testes) undergo.pdfarwholesalelors
 
Scientific evidences I would give in support of evolution1. Paleo.pdf
Scientific evidences I would give in support of evolution1. Paleo.pdfScientific evidences I would give in support of evolution1. Paleo.pdf
Scientific evidences I would give in support of evolution1. Paleo.pdfarwholesalelors
 
Package scopeis the range of visibility for aparticular element or c.pdf
Package scopeis the range of visibility for aparticular element or c.pdfPackage scopeis the range of visibility for aparticular element or c.pdf
Package scopeis the range of visibility for aparticular element or c.pdfarwholesalelors
 
Point of zero charge related to the adsorption phenomenon I surface .pdf
Point of zero charge related to the adsorption phenomenon I surface .pdfPoint of zero charge related to the adsorption phenomenon I surface .pdf
Point of zero charge related to the adsorption phenomenon I surface .pdfarwholesalelors
 

More from arwholesalelors (20)

Algebra, branch of mathematics in which arithmetical operations and .pdf
Algebra, branch of mathematics in which arithmetical operations and .pdfAlgebra, branch of mathematics in which arithmetical operations and .pdf
Algebra, branch of mathematics in which arithmetical operations and .pdf
 
AccuracyData accuracy mentions to the degree with which data prop.pdf
AccuracyData accuracy mentions to the degree with which data prop.pdfAccuracyData accuracy mentions to the degree with which data prop.pdf
AccuracyData accuracy mentions to the degree with which data prop.pdf
 
#include algorithm #include vector #include iostream usi.pdf
#include algorithm #include vector #include iostream usi.pdf#include algorithm #include vector #include iostream usi.pdf
#include algorithm #include vector #include iostream usi.pdf
 
A) I will look for LP (limited partner) such as Yale Investment fund.pdf
A) I will look for LP (limited partner) such as Yale Investment fund.pdfA) I will look for LP (limited partner) such as Yale Investment fund.pdf
A) I will look for LP (limited partner) such as Yale Investment fund.pdf
 
1. The Kepler space telescope detects planets and planet candidates .pdf
1. The Kepler space telescope detects planets and planet candidates .pdf1. The Kepler space telescope detects planets and planet candidates .pdf
1. The Kepler space telescope detects planets and planet candidates .pdf
 
1. When cell in S phase is fused with cell in G1 phase, the cell of .pdf
1. When cell in S phase is fused with cell in G1 phase, the cell of .pdf1. When cell in S phase is fused with cell in G1 phase, the cell of .pdf
1. When cell in S phase is fused with cell in G1 phase, the cell of .pdf
 
1. A Holds individuals accountable for their actions.2. E. A,B and.pdf
1. A Holds individuals accountable for their actions.2. E. A,B and.pdf1. A Holds individuals accountable for their actions.2. E. A,B and.pdf
1. A Holds individuals accountable for their actions.2. E. A,B and.pdf
 
EtSH is the strongest acid, so EtS- is the weakest conjugate base. .pdf
  EtSH is the strongest acid, so EtS- is the weakest conjugate base.  .pdf  EtSH is the strongest acid, so EtS- is the weakest conjugate base.  .pdf
EtSH is the strongest acid, so EtS- is the weakest conjugate base. .pdf
 
Particulars Amount $ Share Holders Funds Com.pdf
     Particulars  Amount $          Share Holders Funds            Com.pdf     Particulars  Amount $          Share Holders Funds            Com.pdf
Particulars Amount $ Share Holders Funds Com.pdf
 
The Nitro group is electron withdrawing, and ther.pdf
                     The Nitro group is electron withdrawing, and ther.pdf                     The Nitro group is electron withdrawing, and ther.pdf
The Nitro group is electron withdrawing, and ther.pdf
 
The Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfThe Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdf
 
You are asked to determine DNA content of a liver tissue. Describe h.pdf
You are asked to determine DNA content of a liver tissue. Describe h.pdfYou are asked to determine DNA content of a liver tissue. Describe h.pdf
You are asked to determine DNA content of a liver tissue. Describe h.pdf
 
when we draw a vertical line it will cross the graph twice(that is m.pdf
when we draw a vertical line it will cross the graph twice(that is m.pdfwhen we draw a vertical line it will cross the graph twice(that is m.pdf
when we draw a vertical line it will cross the graph twice(that is m.pdf
 
We Know that      Baking powder and Baking soda isused as a leave.pdf
We Know that      Baking powder and Baking soda isused as a leave.pdfWe Know that      Baking powder and Baking soda isused as a leave.pdf
We Know that      Baking powder and Baking soda isused as a leave.pdf
 
The fallowing program shows the simple transformation #define GLEW.pdf
The fallowing program shows the simple transformation #define GLEW.pdfThe fallowing program shows the simple transformation #define GLEW.pdf
The fallowing program shows the simple transformation #define GLEW.pdf
 
TlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdf
TlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdfTlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdf
TlI -- Tl+ + I- Ksp = 8.9E-8 = [Tl+][I-]          (eqn. 1) PbI2 .pdf
 
The cells of the reproductive organs (Eg ovaries ad testes) undergo.pdf
The cells of the reproductive organs (Eg ovaries ad testes) undergo.pdfThe cells of the reproductive organs (Eg ovaries ad testes) undergo.pdf
The cells of the reproductive organs (Eg ovaries ad testes) undergo.pdf
 
Scientific evidences I would give in support of evolution1. Paleo.pdf
Scientific evidences I would give in support of evolution1. Paleo.pdfScientific evidences I would give in support of evolution1. Paleo.pdf
Scientific evidences I would give in support of evolution1. Paleo.pdf
 
Package scopeis the range of visibility for aparticular element or c.pdf
Package scopeis the range of visibility for aparticular element or c.pdfPackage scopeis the range of visibility for aparticular element or c.pdf
Package scopeis the range of visibility for aparticular element or c.pdf
 
Point of zero charge related to the adsorption phenomenon I surface .pdf
Point of zero charge related to the adsorption phenomenon I surface .pdfPoint of zero charge related to the adsorption phenomenon I surface .pdf
Point of zero charge related to the adsorption phenomenon I surface .pdf
 

Recently uploaded

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 

Recently uploaded (20)

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

Two types of malware -1. Virus A virus is a contagious program o.pdf

  • 1. Two types of malware :- 1. Virus: A virus is a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers. Virus cannot be spread without a human action. So when you share infected files or send email with viruses as attachment in email, virus spread in another system also. If you have turned off your anti-virus protection your system is vulnerable to virus and other threats. 2. Trojan: This is the most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ”. Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable. 70% malware are trojan horse. When you open a file that have trojan horse or other kind of unscrupulous virus program then it replicate in your system and your system is also get infected. Solution Two types of malware :- 1. Virus: A virus is a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers. Virus cannot be spread without a human action. So when you share infected files or send email with viruses as attachment in email, virus spread in another system also. If you have turned off your anti-virus protection your system is vulnerable to virus and other threats. 2. Trojan: This is the most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ”. Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable. 70% malware are trojan horse. When you open a file that have trojan horse or other kind of unscrupulous virus program then it replicate in your system and your system is also get infected.