SlideShare a Scribd company logo
1 of 6
Download to read offline
Know about
Your Enemies
Know All about Your Enemies
Whenever your computer
starts acting weird and makes
it difficult for you to work on,
the first thing that comes to your
mind is whether a virus has
affected your computer. This
issue is dedicated to explain
the most common threats that you may face. It gives
you some details to help treat the root cause of any
problem.
Here are some definitions on these threats:
Malware is any malicious program or software that’s
designed to exploit a computer user. Malware is
basically an umbrella term covering computer viruses,
worms, Trojan, spyware, rootkit etc.
Virus replicates itself in computer memory when
initiated by the user. They contain some malicious
codes which can affect your files, your operating
system or even your master boot records thereby
making your computer start slow or not boot at all.
Know All about Your Enemies
Rootkits are computer
programs that are designed
by attackers to gain root or
administrative access to your
computer. Once an attacker
gains admin privilege, it
becomes a cakewalk for him
to exploit your system.
Trojan horse is a program that appears useful by
pretending to do certain things in foreground, but in
reality they are working silently in background with the
only objective of harming your computer and/or
stealing valuable information. It penetrates your
computer through downloading malicious software like
keys, cracks, free illegal music, wares etc from an
unknown source.
A worm is an evolved form of a virus. Like virus,
worms replicate and spread themselves but it happens
on a bit larger scale. They not need a human action to
replicate and spread and that’s what makes it more
dangerous. It always seeks for network loopholes to
replicate from computer to computer. Therefore, it is
not recommended to download any email attachments
or to click the links friends share with you in a chat
window.
Know All about Your Enemies
(part II)
Here are more details on these
threats:
Spyware , unlike any of the
above, doesn’t harm your
computer in any way. Instead,
they attack you! Once installed
on a system they run in background and keep on
collecting user’s personal data. These data can include
your credit card numbers, passwords, important files
and any other personal stuff. It is always advisable to
download and install software from trusted sources.
A backdoor is a method of bypassing normal
authentication procedures. Once a system has been
compromised, one or more backdoors may be installed
in order to allow easier access in the future. Backdoors
may also be installed prior to malicious software, to
allow attackers entry.

It is worth-knowing that crackers use backdoors to
secure remote access to a computer, while attempting
to remain hidden from casual inspection. To install
backdoors, crackers may use Trojan horses, worms, or
other methods.
Pick up Your Armor and Face
Your Enemies
Through the previous issues
of Softex newsletter, you were
introduced to your enemies and
were given detailed description
on each of them. I believe now
you need your shining armor and
sword to confront these vicious
threats.

In this case, regular scanning
and an effective antivirus system are essential for the
security of your system, which prevents damage and
data loss.
The following steps will guide you to choose the best
antivirus for you:
Step 1: Make a list of your requirements
You have to assess your requirements and know all
about your operating system in order to know which
antivirus (for your PC, Business or Mobile ). For
example, if you are looking for business features,
however, you will want offerings of a full suite such as
anti-spyware, spam filter, anti-virus and firewall.
For More Related Articles,
Please Visit
http://www.softexsw.com/en/articles.php

More Related Content

What's hot

Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking IT Department Akre
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 

What's hot (20)

Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Malware
MalwareMalware
Malware
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Malware
MalwareMalware
Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 

Viewers also liked

Juan salvador gaviota
Juan salvador gaviotaJuan salvador gaviota
Juan salvador gaviotaClaudia Soto
 
50th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 201050th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 2010Miqui Mel
 
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2Federico Ruvituso
 
alimentacion complementaria en el lactante
alimentacion complementaria en el lactantealimentacion complementaria en el lactante
alimentacion complementaria en el lactanteElvirarrr
 
Class.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.introClass.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.introRoss Tang
 
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012cootaxim
 
Presentación1
Presentación1Presentación1
Presentación1alidasonco
 
1 coleccion deejerciciosen word
1 coleccion deejerciciosen word1 coleccion deejerciciosen word
1 coleccion deejerciciosen wordclaudia landeta
 
Assessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingAssessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingfusonline
 
Learning outcomes
Learning outcomesLearning outcomes
Learning outcomesfusonline
 
Engaged learning and collaboration
Engaged learning and collaborationEngaged learning and collaboration
Engaged learning and collaborationfusonline
 
Ease of communication
Ease of communicationEase of communication
Ease of communicationfusonline
 
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchOVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchZaire Overton
 
Opc tema 1 - unidad I
Opc  tema 1 - unidad IOpc  tema 1 - unidad I
Opc tema 1 - unidad IOpc Udo
 

Viewers also liked (20)

Juan salvador gaviota
Juan salvador gaviotaJuan salvador gaviota
Juan salvador gaviota
 
50th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 201050th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 2010
 
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
 
Confined Space Acces
Confined Space AccesConfined Space Acces
Confined Space Acces
 
alimentacion complementaria en el lactante
alimentacion complementaria en el lactantealimentacion complementaria en el lactante
alimentacion complementaria en el lactante
 
Girugamesh!
Girugamesh!Girugamesh!
Girugamesh!
 
Higiene postural
Higiene posturalHigiene postural
Higiene postural
 
Class.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.introClass.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.intro
 
vva stand down
vva stand downvva stand down
vva stand down
 
El colera
El coleraEl colera
El colera
 
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
 
Presentación1
Presentación1Presentación1
Presentación1
 
1 coleccion deejerciciosen word
1 coleccion deejerciciosen word1 coleccion deejerciciosen word
1 coleccion deejerciciosen word
 
Assessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingAssessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & grading
 
Learning outcomes
Learning outcomesLearning outcomes
Learning outcomes
 
Engaged learning and collaboration
Engaged learning and collaborationEngaged learning and collaboration
Engaged learning and collaboration
 
Ease of communication
Ease of communicationEase of communication
Ease of communication
 
Short quiz consists
Short quiz consistsShort quiz consists
Short quiz consists
 
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchOVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
 
Opc tema 1 - unidad I
Opc  tema 1 - unidad IOpc  tema 1 - unidad I
Opc tema 1 - unidad I
 

Similar to Know More about Your Enemies

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

Similar to Know More about Your Enemies (20)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
MALWARE
MALWAREMALWARE
MALWARE
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 

More from Softex Software House

شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...Softex Software House
 
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءالتعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءSoftex Software House
 
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولشرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولSoftex Software House
 
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتتعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتSoftex Software House
 
تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟Softex Software House
 
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىنظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىSoftex Software House
 
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshareكيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على SlideshareSoftex Software House
 
كتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةكتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةSoftex Software House
 
نظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسنظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسSoftex Software House
 
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتنظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتSoftex Software House
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيSoftex Software House
 

More from Softex Software House (20)

Mc updates june 2015
Mc updates june 2015Mc updates june 2015
Mc updates june 2015
 
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
 
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءالتعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
 
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولشرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
 
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتتعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
 
تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟
 
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىنظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
 
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshareكيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
 
كتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةكتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقية
 
نظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسنظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكس
 
Softex_ Clinic Manager
Softex_ Clinic ManagerSoftex_ Clinic Manager
Softex_ Clinic Manager
 
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتنظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
 
Softex Travel Control
Softex Travel Control Softex Travel Control
Softex Travel Control
 
Social media in Business
Social media in BusinessSocial media in Business
Social media in Business
 
Email Spam vs. Email Marketing
Email Spam vs. Email MarketingEmail Spam vs. Email Marketing
Email Spam vs. Email Marketing
 
How Strong is Your Password?
How Strong is Your Password?How Strong is Your Password?
How Strong is Your Password?
 
Build Everlasting Relationship
Build Everlasting Relationship Build Everlasting Relationship
Build Everlasting Relationship
 
most used colors in Web Design
most used colors in Web Designmost used colors in Web Design
most used colors in Web Design
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Know More about Your Enemies

  • 2. Know All about Your Enemies Whenever your computer starts acting weird and makes it difficult for you to work on, the first thing that comes to your mind is whether a virus has affected your computer. This issue is dedicated to explain the most common threats that you may face. It gives you some details to help treat the root cause of any problem. Here are some definitions on these threats: Malware is any malicious program or software that’s designed to exploit a computer user. Malware is basically an umbrella term covering computer viruses, worms, Trojan, spyware, rootkit etc. Virus replicates itself in computer memory when initiated by the user. They contain some malicious codes which can affect your files, your operating system or even your master boot records thereby making your computer start slow or not boot at all.
  • 3. Know All about Your Enemies Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system. Trojan horse is a program that appears useful by pretending to do certain things in foreground, but in reality they are working silently in background with the only objective of harming your computer and/or stealing valuable information. It penetrates your computer through downloading malicious software like keys, cracks, free illegal music, wares etc from an unknown source. A worm is an evolved form of a virus. Like virus, worms replicate and spread themselves but it happens on a bit larger scale. They not need a human action to replicate and spread and that’s what makes it more dangerous. It always seeks for network loopholes to replicate from computer to computer. Therefore, it is not recommended to download any email attachments or to click the links friends share with you in a chat window.
  • 4. Know All about Your Enemies (part II) Here are more details on these threats: Spyware , unlike any of the above, doesn’t harm your computer in any way. Instead, they attack you! Once installed on a system they run in background and keep on collecting user’s personal data. These data can include your credit card numbers, passwords, important files and any other personal stuff. It is always advisable to download and install software from trusted sources. A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. It is worth-knowing that crackers use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, crackers may use Trojan horses, worms, or other methods.
  • 5. Pick up Your Armor and Face Your Enemies Through the previous issues of Softex newsletter, you were introduced to your enemies and were given detailed description on each of them. I believe now you need your shining armor and sword to confront these vicious threats. In this case, regular scanning and an effective antivirus system are essential for the security of your system, which prevents damage and data loss. The following steps will guide you to choose the best antivirus for you: Step 1: Make a list of your requirements You have to assess your requirements and know all about your operating system in order to know which antivirus (for your PC, Business or Mobile ). For example, if you are looking for business features, however, you will want offerings of a full suite such as anti-spyware, spam filter, anti-virus and firewall.
  • 6. For More Related Articles, Please Visit http://www.softexsw.com/en/articles.php