competition wizard magazine

competition wizard magazine
competition wizard magazine

Saturday, July 9, 2022

grihalakshmi magazine

grihalakshmi magazine 

grihalakshmi magazine  Published this article page no   139 1. Virus A program that can infect other programs by modifying them to include a possible evolved copy of itself. 2. Worms Disseminated through computer networks unlike viruses computer worms are malicious programs that copy themselves from system to system rather than infiltrating legitimate files. 3. Trojans Trojan or trojan horse is a program that generally impairs the security of a system. Trojans are used to create backdoors (a program that allows outside access into a secure network) on computers belonging to a secure network so that a hacker can have access to the secure network. 4. Hoax An email that warns the user of a certain system that is harming the computer. The message thereafter instructs the user to run a procedure (most often in the form of a download) to correct the harming system. When this program is run it invades the system and deletes an important file. 5. Spyware Invades a computer and as its name implies monitors a users activities without consent. Spywares are usually forwarded through unsuspecting emails with bonafide email i.ds. Spyware continues to infect millions of computers globally. Insta Curious Have you heard of Google Project Zero? Reference  Why did the govt ban more Chinalinked apps? Context The Ministry of Electronics and Information Technology (MeitY) has banned 54 more apps which have either originated in China or have some Chinese connection.These apps were banned for being a threat to national security grihalakshmi magazine buy. 

grihalakshmi magazine 


No comments:

Post a Comment