Security Threats : Something More than Virus !



When it comes to security threats, it’s no longer as simple as a virus. There are many kinds of malware that attack your machine. Here is a quick look at what they are and what they do.

Virus

A program that piggybacks on other files, and spreads with malicious intent, these are actually uncommon now

Common sources: public computers, flash memory, LAN
Solution: Use a security suite

Worm

Unlike a virus, a worm can spread without attaching itself to files. It is also programmed to change itself, making variants more difficult to detect. Sometimes worms are updated remotely.

Common sources: LAN, email
Solution: Update the system and anti-virus, use a firewall, track security patches

Trojan

A Trojan is a software that pretends to work for you, but is actually doing something else, being a part of a botnet or allowing for unauthorized access.

Common sources: torrents, suspicious downloads, web sites
Solution: be careful of what you download

Exploit

An exploit is an inherent “hole” in an operating system or software, that allows malware such as Trojans or viruses to spread

Common sources: The base operating system, installed software (such as office suites)
Solution: keep your system and applications updated

The Jargon File

Benchmark: A software for testing a particular piece of hardware. A graphic card benchmark would render a lot of polygons and effects. A CPU benchmark would feed in a lot of calculations, and so on.

Distro: A distro is a distribution, or flavor of the Linux operating system. Common Linux distros include Ubuntu, OpenSuse and Fedora.

Ethical Hacker: An ethical hacker is someone who finds out possible weaknesses in a network or a system before the bad guys do.

GUI: A GUI, pronounced Gooey, stands for Graphical User Interface, which is a set of buttons, windows, panels and other devices for users to interact with a machine using a mouse and a keyboard, or other input devices.

MID: Mobile Internet Device, can be a Mobile Phone with internet access, or a netbook. PMPs that interface with wireless networks are not MIDs. Any device that allows significant activity on various web sites is an MID.




Get Tech Updates via eMail :

0 comments:

Post a Comment

 

About Tech Guru

TechQuark
TechGuru is a leading technology site, dedicated to software, gadgets, tech news and reviews. The site offers articles, tutorials and how-to guides on all things related to personal technology, desktop applications, productive online tools, social networking sites, windows, office etc.

Founded in 2007, TechGuru features audience who have the passion for Software and Technology and seeks to promote awareness about the internet and computing.

Get News on the Go

Mobile TechQuarkTech Guru is a mobile-friendly website. Simply bookmark m.techquark.com in your mobile browser for free access anytime, anywhere.

Contact Us / Send a Tip

Use Contact Form, if you have Comments, Problems, Suggestions, Praise, Complains about the site. Your suggestions and articles are valuable to us.

Copyright © 2007- Tech Guru - All rights reserved. No part of this blog be republished or written without prior permission of the author


Privacy Policy | Disclaimer | Contact | Advertise With Us


Designed and Maintained by Shubham Gupta