What is the difference between viruses and worms (worms)?
******
Viruses are programs Ttimz feature reincarnation, meaning they spread from file to file in your compiler and machine to another. In addition, it may omit some information or have been destroyed.
Worms are usually considered a kind of virus is that there are several fundamental differences. Worms are computer programs that Ttanask without harming the other files. Instead these programs carry on after the computer simply searching for a way to move to other computers.
With regard to viruses The longer the period that have not discovered where the greater the number of files that have been destroyed in the computer. Worms is a single file The virus is a set of codes that add to the same files in the computer.
What is an attack DoS? What is an attack DdoS?
DoS is an abbreviation for Taibir Denial-of-Service means denial of service has been developed specifically to block or stop the work of the Website, server or other resources in the network. There are different ways for hackers to achieve these goals. The most common way is flooding the server to send requests beyond its capacity to address them. This may make the server is running more slowly than usual (and the pages will take more time than usual) may lead to the destruction of the entire server (causing disabling websites).
DdoS attack is an abbreviation of the term Distributed-Denial-of-Service and mean distributed denial of service attacks and these attacks are different from its predecessor that it is managed using several drives. Valmchterq for example, does the work through two mechanisms are exploiting loopholes in the computer, or download a Trojan horse or a group of malicious code.
What is phishing?
Phishing is a special type of electronic crimes committed by criminals in order to pay online Almstkhaddin to disclose their information private banking. The trolls create a fake site looks like the bank site. Then tries to make you visit their site trolls and recorded information such as passwords and password. Hackers usually send a large number of e-mails include a link to this site fake.
What is ROOTKIT?
This term refers to a set of programs which are used by hackers to evade detection by trying to get the possibility of illegal access to the content of the computer. This term has been invented by Unix systems, also used by the designers of trojans to hide their activity is legal. The primary objective of the "Root Kit" is to conceal the activity Trojans. If they were loaded into the operating system they are not seen by the user as they are designed which are difficult to detect by the control programs and defense. The entry of users to the computers in a coordinated and not a private Bkmlp passage easier for cybercriminals Download "Root Kit" on the computer.
What is malware?
Harmful or malicious software (Malware - is the abbreviation of two words malicious software) refers to special programs to damage the computer. This term includes all types of viruses, worms, Trojan horses and programs in, spies for the keyboard, password thieves and other malicious software.
Formerly it was enough to describe something with the virus or Trojan horse is that the methods and modes of transmission have evolved and no longer believe these terms are adequate explanation for all types of malicious programs.
What is a Trojan horse and where they came this name?
A wooden horse used by the ancient Greeks to enter the city of Troy and control. Adopted the definition of a Trojan horse program is defined as illegal and has launched the destruction of computer equipment. Trojans do not spread by itself and in this they differ from worms and viruses.
Currently carrying trojans on the computers and the secret of harm without the knowledge of the computer. A lot of e-crimes that occur today caused by different types of Trojans. Most famous of these horses Backdoor Trojans (usually includes a spy of the keyboard), Trojan horses, spy, Trojan horses, password stealer, trojans proxy that transforms the computer into a machine to spread spam.
What is meant by the term DRIVE-BY DOWNLOAD?
This term means that when browsing a website is the transmission from the site to your computer. Usually the hackers search for vulnerable servers in the network that can be penetrated. You are transferring codes to harmful web pages. When a user is browsing this site, automatically download malware to the infected computer from the page.
What is KEYLOGGER (keyboard spy)?
This program logs all all clicks on the keyboard may be used by hackers to obtain private data (such as passwords, passwords, bank account numbers, etc.). Typically include Backdoor Trojans a program like that.
What is ADWARE (targeted advertising program)?
This term refers to programs that launch ads (banners that appear suddenly) or to redirect search results to advertising sites. Usually include this program within the free software: If you download a free program from the Internet, the program will carry harmful to your system without your knowing. Sometimes, a Trojan horse to download this program from the site to your computer.
It should be noted that browsers that are not updated often contain gaps. These programs are vulnerable to hackers and tools, which can carry adware ADWARE directed to the computer. Abducted (Browser Hijackers) may change computer settings, or redirect URLs to specific sites or they change the default HOME. They may also direct the search query to the pages is free (often pornographic sites).
Usually does not show the same programs targeted ads in the operating system. Where there are no in the list of operating system software and have no icons. The attempt to delete these programs may lead to disabling the operating system in a computer.
What is BOTNET?
This term is used to refer to a network of computers monitored by hackers using Trojan horses or other malicious software.
What is SPYWARE (spyware)?
As appears from the name SPYWARE programs are designed to "harvest" of computer data and re-sent to a third party without the owner knowing it. Such programs may monitor the clicks on the keyboard (keyloggers as spies keys), or may collect confidential information (passwords, bank account numbers, etc.), or collect email addresses or track Internet surfing habits.