Perverse software, Basic Computer Science

Assignment Help:

Perverse software:

Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data without the user's intention or even sabotaging the operational system.  Perverse Software is also known as Malicious software or malware.

It is a type of software that is designed to secretly access a computer system, without the owner's consent, and damage the system. The impact can be as damaging as shutting down a business, pulling down computer network or significantly impacting regular use of individual computer systems etc.

The damage done can vary from something as little as changing the author's name in a document to full control of one's machine without the ability to easily find out.   

Most malware requires the user to initiate its operation. For example, sending infectious attachments (it acts when users downloads them and runs the attachment) in e-mails, browsing a malicious website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the operating system.  

Early infectious programs, such as Internet Worm and MS DOS viruses, were written as experiments and were largely harmless or at most annoying. With the spread of broadband  Internet access, malicious software has been designed for a profit, for forced advertising. Here the malware keeps track of user's web browsing, and pushes related advertisements.   


Related Discussions:- Perverse software

Explain the functions of alu, Question 1 Write down the Booth's Multiplica...

Question 1 Write down the Booth's Multiplication Algorithm. Justify the Booth's Multiplication Algorithm Question 2 Explain the functions of ALU Question 3 Define the term ins

A brief introduction of python, Python is an interpreted, high-level, inter...

Python is an interpreted, high-level, interactive and object oriented-scripting language. Python was designed to be extremely readable which uses English keywords commonly where as

Use Decision Tree Technique to Optimize Institution’s Studen, Use Decision ...

Use Decision Tree Technique to Optimize Institution’s Student Admission Process– A Case Study

10, constant key use for in calculator

constant key use for in calculator

Define server clustering, Question 1 Discuss the impacts of disaster faced...

Question 1 Discuss the impacts of disaster faced by the organization Question 2 Explains the steps involved in disaster recovery planning Question 3 What do you mean by

Assignment Help, How would you format while loops to fufill my project writ...

How would you format while loops to fufill my project write up?

Pseudocode, Design a program that will read a file of sales records and pro...

Design a program that will read a file of sales records and produce a sales report. Each record in the file contains a customer’s ID, name, a sales amount, and a validated GST code

Explain the universal nand and nor gates, Question 1 Describe the followin...

Question 1 Describe the following- Binary Number System b. Octal Number System Hexadecimal Number System   Question 2 Describe the Canonical Logical Forms-

Concept in programming language, CONCEPT IN PROGRAMMING LANGUAGE: A Pr...

CONCEPT IN PROGRAMMING LANGUAGE: A Programming Language is used to design and describe a set of instructions and computations to be executed by a computer. To do programming,

Data structures hw help, Create an implementation of the Ordered Associativ...

Create an implementation of the Ordered Associative Array API using left-leaning red-black trees. Illustrate the use of the API by refactoring your WordBench as a client of Ordered

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd