grihalakshmi magazine Published this article page no 139 1. Virus A program that can infect other programs by modifying them to include a possible evolved copy of itself. 2. Worms Disseminated through computer networks unlike viruses computer worms are malicious programs that copy themselves from system to system rather than infiltrating legitimate files. 3. Trojans Trojan or trojan horse is a program that generally impairs the security of a system. Trojans are used to create backdoors (a program that allows outside access into a secure network) on computers belonging to a secure network so that a hacker can have access to the secure network. 4. Hoax An email that warns the user of a certain system that is harming the computer. The message thereafter instructs the user to run a procedure (most often in the form of a download) to correct the harming system. When this program is run it invades the system and deletes an important file. 5. Spyware Invades a computer and as its name implies monitors a users activities without consent. Spywares are usually forwarded through unsuspecting emails with bonafide email i.ds. Spyware continues to infect millions of computers globally. Insta Curious Have you heard of Google Project Zero? Reference Why did the govt ban more Chinalinked apps? Context The Ministry of Electronics and Information Technology (MeitY) has banned 54 more apps which have either originated in China or have some Chinese connection.These apps were banned for being a threat to national security grihalakshmi magazine buy.
No comments:
Post a Comment