Pievienot darbus Atzīmētie0
Darbs ir veiksmīgi atzīmēts!

Atzīmētie darbi

Skatītie0

Skatītie darbi

Grozs0
Darbs ir sekmīgi pievienots grozam!

Grozs

Reģistrēties

interneta bibliotēka
Atlants.lv bibliotēka
3,99 € Ielikt grozā
Gribi lētāk?
Identifikators:357208
 
Autors:
Vērtējums:
Publicēts: 02.06.2009.
Valoda: Angļu
Līmenis: Augstskolas
Literatūras saraksts: 6 vienības
Atsauces: Nav
Laikposms: 20. gs. (1900. - 1999. g.)
2000. - 2010. g.
SatursAizvērt
Nr. Sadaļas nosaukums  Lpp.
  INTRODUCTION    3
  MALWARE    4
  INFECTIOUS MALWARE: VIRUSES AND WORMS    5
  TROJAN HORSES, ROOTKITS, AND BACKDOORS    6
  TROJAN HORSES    6
  TROJAN HORSE “BACK ORIFICE”    7
  ROOTKITS    8
  BACKDOORS    9
  ANTI-MALWARE PROGRAMS    10
  CONCLUSIONS    13
  TO KNOW    14
  LITERATURE    15
Darba fragmentsAizvērt

Besides software which is useful and helpful developed by programmers there are also some program codes written to introduce damages in the software by attaching copies themselves to some objects within the system, and normally having a detrimental effect.
Many people are afraid of malware, mostly because they do not know much about them. Computer viruses and network security is important. There are things that are not public information. Therefore it is good to be a weare of possible network security problems.
Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several American states, including California and West Virginia.
Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs.
Preliminary results from Symantec published in 2008 suggested that "the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications." According to F-Secure, "As much malware [was] produced in 2007 as in the previous 20 years altogether." Malware's most common pathway from criminals to users is through the Internet: primarily by email and the World Wide Web.…

Parādīt vairāk līdzīgos ...

Atlants

Izvēlies autorizēšanās veidu

E-pasts + parole

E-pasts + parole

Norādīta nepareiza e-pasta adrese vai parole!
Ienākt

Aizmirsi paroli?

Draugiem.pase
Facebook

Neesi reģistrējies?

Reģistrējies un saņem bez maksas!

Lai saņemtu bezmaksas darbus no Atlants.lv, ir nepieciešams reģistrēties. Tas ir vienkārši un aizņems vien dažas sekundes.

Ja Tu jau esi reģistrējies, vari vienkārši un varēsi saņemt bezmaksas darbus.

Atcelt Reģistrēties