Perverse software, Basic Computer Science

Assignment Help:

Perverse software:

Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data without the user's intention or even sabotaging the operational system.  Perverse Software is also known as Malicious software or malware.

It is a type of software that is designed to secretly access a computer system, without the owner's consent, and damage the system. The impact can be as damaging as shutting down a business, pulling down computer network or significantly impacting regular use of individual computer systems etc.

The damage done can vary from something as little as changing the author's name in a document to full control of one's machine without the ability to easily find out.   

Most malware requires the user to initiate its operation. For example, sending infectious attachments (it acts when users downloads them and runs the attachment) in e-mails, browsing a malicious website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the operating system.  

Early infectious programs, such as Internet Worm and MS DOS viruses, were written as experiments and were largely harmless or at most annoying. With the spread of broadband  Internet access, malicious software has been designed for a profit, for forced advertising. Here the malware keeps track of user's web browsing, and pushes related advertisements.   


Related Discussions:- Perverse software

I/O Stream and Arrays, Write a program that: 1. Ask the user for names of t...

Write a program that: 1. Ask the user for names of the two iput files and a name of an output file. The two input files contain integers in any order. Eachimput file contains no mo

Flowchart, Fahrenheit to celsius convertion

Fahrenheit to celsius convertion

Data structures, let me know if you can do this assignment and how long it ...

let me know if you can do this assignment and how long it takes

ASP.net, educational website project

educational website project

Explain particle collision in detail, Question 1 Name the different types ...

Question 1 Name the different types of emitters and explain them in brief Question 2 List and explain the Particle Attributes Question 3 Explain Particle Collision

Database management help, Suppose that you are writing a stored procedure t...

Suppose that you are writing a stored procedure to record new purchases. Suppose that you know that while your procedure is running, another stored procedure that records shipment

Embedded operating systems, Embedded Operating Systems, Devices have EOS bu...

Embedded Operating Systems, Devices have EOS built-in, OPERATING SYSTEM embed on the System itself, Cell phones, PDAs, medical equipment Fast, Application specific Stable a

C++, Ask question #MiniA string S is said to be "Super ASCII", if it contai...

Ask question #MiniA string S is said to be "Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''''a''

Overall functions , OVERALL FUNCTIONS : There are three points that must b...

OVERALL FUNCTIONS : There are three points that must be borne firmly in mind when considering the use of computers in laboratory management. Overall Function This includes

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd