How trojan horses or worms affect a computer system, JAVA Programming

Assignment Help:

How Trojan Horses or Worms affect a computer system? What guidelines should be adopted to troubleshoot along with malicious software?

Trojan horses are stand-alone programs. The look like what they are not and appear to be sometime interesting and harmless (e.g. a game) there execution results in destruction.

Worms only create copies of themselves on the infected computer.
Following guidelines should be adopted to troubleshoot along with malicious software:
• Download SW from trusted sites just.
• Do not open attachments of unsolicited eMails.
• Use floppy disks and CDROMs that have been used in trusted computers only.
• While transferring files from your computer to another, use the write-protection notches.
• Stay away from pirated SW.
• Regularly back your data up.
• Install Antivirus SW; remain it and its virus definitions updated.

b) Which part of a virus consists of malicious computer instructions?
Payload is the part of virus in which commonly consists of malicious computer instructions.

 

 


Related Discussions:- How trojan horses or worms affect a computer system

RatinalAssignment, 1. Make a class Rational to provide at least following m...

1. Make a class Rational to provide at least following methos and constructors: Rational r1= new Rational (3,5); Rational r2= new Rational (4,7); Rational r3=r1.add(r2);

Programming Excercise, I have to Create a program that determine the shippi...

I have to Create a program that determine the shipping cost for an order based on he following chart: From To Price $0.00 $19.99 $2.95 $20.00 $49.99 $3.95

Web application using javascript-xml and css, Journal of how you came to AU...

Journal of how you came to AUB Write a web application using JavaScript, XML and CSS that contains a journal of major events and places on your journey to Bond University. The

Difference b/w software platform and java platform, Java platform is a soft...

Java platform is a software-only platform independent, which runs on top of other hardware-based platforms like WINDOWS, UNIX, NT etc.   The Java platform has 2 main com

What is lookupdispatchaction, The LookupDispatchAction is a subclass of Dis...

The LookupDispatchAction is a subclass of DispatchAction. It does a reverse lookup on the resource package to get the key and then gets the method whose name is associated with the

Digital clock, how to Using polymorphism to write a program to display digi...

how to Using polymorphism to write a program to display digital clock?

How dos attack is a cyber crime what cyber crime can be used, How DoS attac...

How DoS attack is a cyber crime? For what cyber crime can be used? DoS stands for Decline of Service and it is a cyber crime as it jams and within a few cases shut down the goa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd