How trojan horses or worms affect a computer system, JAVA Programming

Assignment Help:

How Trojan Horses or Worms affect a computer system? What guidelines should be adopted to troubleshoot along with malicious software?

Trojan horses are stand-alone programs. The look like what they are not and appear to be sometime interesting and harmless (e.g. a game) there execution results in destruction.

Worms only create copies of themselves on the infected computer.
Following guidelines should be adopted to troubleshoot along with malicious software:
• Download SW from trusted sites just.
• Do not open attachments of unsolicited eMails.
• Use floppy disks and CDROMs that have been used in trusted computers only.
• While transferring files from your computer to another, use the write-protection notches.
• Stay away from pirated SW.
• Regularly back your data up.
• Install Antivirus SW; remain it and its virus definitions updated.

b) Which part of a virus consists of malicious computer instructions?
Payload is the part of virus in which commonly consists of malicious computer instructions.

 

 


Related Discussions:- How trojan horses or worms affect a computer system

Explanation of EM algorithm, try { pa="weblog"; pa...

try { pa="weblog"; pas="weblog"; Connection c; Statement st;

Finding highest and lowest numbers, Hi i need help creating a small program...

Hi i need help creating a small program that basically asks the user how many numbers hes going to use and then ask for those numbers and see which is the biggest and the smaller

What is an objects lock, What is an object's lock and which objects have lo...

What is an object's lock and which objects have locks? An object's lock is a mechanism that is used by multiple threads to get synchronized access to the object. A thread may i

Posting on a wall, Viewing a User's Wall Where your project allows you t...

Viewing a User's Wall Where your project allows you to view a user's profile, your ZHTML must provide the following capabilities: 1. Provide a Wall for that user profile, dis

Implement decision tree algorithm using netbeans, Implement Decision Tree A...

Implement Decision Tree Algorithm using Netbeans (Java) & Microsoft Access 2007. "One Level is enough, output should contains gain of each attribute, the selected attribute and

What is the difference between internet and intranet, What is the differenc...

What is the difference between Internet and Intranet ? Intranet and internet are 2 domains which are extremely a like but frequent segregated in order to manage security. Inter

Pebble merchant, There is a pebble merchant. He sells the pebbles, that are...

There is a pebble merchant. He sells the pebbles, that are used for shining the floor. His main duty is to take the length of the room’s sides. But he sometimes mistakes doing tha

EJB in J2EE? , EJB 2.x is broadly adopted server side component architectu...

EJB 2.x is broadly adopted server side component architecture for J2EE. 1. EJB is a remote, distributed multi-tier system and allows protocols like IIOP, JRMP, and HTTP etc.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd