How trojan horses or worms affect a computer system, JAVA Programming

Assignment Help:

How Trojan Horses or Worms affect a computer system? What guidelines should be adopted to troubleshoot along with malicious software?

Trojan horses are stand-alone programs. The look like what they are not and appear to be sometime interesting and harmless (e.g. a game) there execution results in destruction.

Worms only create copies of themselves on the infected computer.
Following guidelines should be adopted to troubleshoot along with malicious software:
• Download SW from trusted sites just.
• Do not open attachments of unsolicited eMails.
• Use floppy disks and CDROMs that have been used in trusted computers only.
• While transferring files from your computer to another, use the write-protection notches.
• Stay away from pirated SW.
• Regularly back your data up.
• Install Antivirus SW; remain it and its virus definitions updated.

b) Which part of a virus consists of malicious computer instructions?
Payload is the part of virus in which commonly consists of malicious computer instructions.

 

 


Related Discussions:- How trojan horses or worms affect a computer system

Develop e-commerce website, Develop E-Commerce Website I need an E-Comme...

Develop E-Commerce Website I need an E-Commerce website for my furniture shop which requires to an online store to buy products online. So, Skills required: HTML, Java, Gr

the file system simulator , • Study and enhance the File System Simulator ...

• Study and enhance the File System Simulator - See the FS_sim slide deck • New features - blockinfo - a new application that displays the information about the blocks in the file

Program to read a keyboard value and exit from the code, Using the above t...

Using the above thread program, now create 20 threads in your program and run them. No need to wait for the keyboard in each thread, just print "Hello" and its thread id in each t

Java, 1. Which of the following are not valid Java identifiers, and why? (...

1. Which of the following are not valid Java identifiers, and why? (a) wolVes (b) United(there is only one) (c) 87 (d) 5 3 (e) Real ale (f) isFound?by 2. A class Television

What are the different types of actions in struts, The different types of a...

The different types of actions in Struts are: ? DispatchAction ? LookupDispatchAction ? ForwardAction ? SwitchAction ? IncludeAction

What does the keyword "synchronize" mean in java, What does the keyword " s...

What does the keyword " synchronize " mean in java. What are the usage and disadvantages of synchronization?

Java project illustrate sequential and selection programming, This project ...

This project focuses on demonstrating the understanding of data types, input/output, sequential and selection programming statements, and mathematical operations. The project re

Program a pong game using rmi, Using RMI, program a PONG game that enables ...

Using RMI, program a PONG game that enables two users to play against one another. Pong class: package graphics;/* * Copyright (c) 2006, Your Corporation. All Rights Reserved. */

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd