How trojan horses or worms affect a computer system, JAVA Programming

Assignment Help:

How Trojan Horses or Worms affect a computer system? What guidelines should be adopted to troubleshoot along with malicious software?

Trojan horses are stand-alone programs. The look like what they are not and appear to be sometime interesting and harmless (e.g. a game) there execution results in destruction.

Worms only create copies of themselves on the infected computer.
Following guidelines should be adopted to troubleshoot along with malicious software:
• Download SW from trusted sites just.
• Do not open attachments of unsolicited eMails.
• Use floppy disks and CDROMs that have been used in trusted computers only.
• While transferring files from your computer to another, use the write-protection notches.
• Stay away from pirated SW.
• Regularly back your data up.
• Install Antivirus SW; remain it and its virus definitions updated.

b) Which part of a virus consists of malicious computer instructions?
Payload is the part of virus in which commonly consists of malicious computer instructions.

 

 


Related Discussions:- How trojan horses or worms affect a computer system

What is prototype, Prototype is having multiple instances or having clone.

Prototype is having multiple instances or having clone.

Why processing an unknown number of parameters, Why Processing An Unknown N...

Why Processing An Unknown Number Of Parameters ? Most of the time you have a fairly high-quality idea of what parameters will and won't be passed to your applet. Therefore som

Programming Excercise, I have to Create a program that determine the shippi...

I have to Create a program that determine the shipping cost for an order based on he following chart: From To Price $0.00 $19.99 $2.95 $20.00 $49.99 $3.95

What are trojan horses, What are Trojan Horses? Trojan Horses are unlik...

What are Trojan Horses? Trojan Horses are unlike viruses usually they are stand-alone programs. The look such as what they are not. They appear to be something harmless and int

Explain traversing through a collector using iterator, Explain traversing t...

Explain traversing through a collector using Iterator. Ans. We can access each element in Collection by using Iterators regardless of how they are organized in collector. Ite

What is java bytecode, What is java Bytecode Java programs (Source code...

What is java Bytecode Java programs (Source code) are compiled into a form known as Java bytecodes. Java compiler reads Java language source (.java) files, translates source

What is jms consumer, JMS consumer is a JMS client that receives messages.

JMS consumer is a JMS client that receives messages.

Jzebra integration into open erp web client, JZEBRA Integration into (Open ...

JZEBRA Integration into (Open ERP) Web Client Local Spooling/Printing to Local Print Device on ERP Client side Project Description: JZEBRA Integration into Open ERP Web Clien

Windows registry, need a java program that can read and display the values ...

need a java program that can read and display the values from a windows registry

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd