SlideShare a Scribd company logo
1 of 6
Download to read offline
Know about
Your Enemies
Know All about Your Enemies
Whenever your computer
starts acting weird and makes
it difficult for you to work on,
the first thing that comes to your
mind is whether a virus has
affected your computer. This
issue is dedicated to explain
the most common threats that you may face. It gives
you some details to help treat the root cause of any
problem.
Here are some definitions on these threats:
Malware is any malicious program or software that’s
designed to exploit a computer user. Malware is
basically an umbrella term covering computer viruses,
worms, Trojan, spyware, rootkit etc.
Virus replicates itself in computer memory when
initiated by the user. They contain some malicious
codes which can affect your files, your operating
system or even your master boot records thereby
making your computer start slow or not boot at all.
Know All about Your Enemies
Rootkits are computer
programs that are designed
by attackers to gain root or
administrative access to your
computer. Once an attacker
gains admin privilege, it
becomes a cakewalk for him
to exploit your system.
Trojan horse is a program that appears useful by
pretending to do certain things in foreground, but in
reality they are working silently in background with the
only objective of harming your computer and/or
stealing valuable information. It penetrates your
computer through downloading malicious software like
keys, cracks, free illegal music, wares etc from an
unknown source.
A worm is an evolved form of a virus. Like virus,
worms replicate and spread themselves but it happens
on a bit larger scale. They not need a human action to
replicate and spread and that’s what makes it more
dangerous. It always seeks for network loopholes to
replicate from computer to computer. Therefore, it is
not recommended to download any email attachments
or to click the links friends share with you in a chat
window.
Know All about Your Enemies
(part II)
Here are more details on these
threats:
Spyware , unlike any of the
above, doesn’t harm your
computer in any way. Instead,
they attack you! Once installed
on a system they run in background and keep on
collecting user’s personal data. These data can include
your credit card numbers, passwords, important files
and any other personal stuff. It is always advisable to
download and install software from trusted sources.
A backdoor is a method of bypassing normal
authentication procedures. Once a system has been
compromised, one or more backdoors may be installed
in order to allow easier access in the future. Backdoors
may also be installed prior to malicious software, to
allow attackers entry.

It is worth-knowing that crackers use backdoors to
secure remote access to a computer, while attempting
to remain hidden from casual inspection. To install
backdoors, crackers may use Trojan horses, worms, or
other methods.
Pick up Your Armor and Face
Your Enemies
Through the previous issues
of Softex newsletter, you were
introduced to your enemies and
were given detailed description
on each of them. I believe now
you need your shining armor and
sword to confront these vicious
threats.

In this case, regular scanning
and an effective antivirus system are essential for the
security of your system, which prevents damage and
data loss.
The following steps will guide you to choose the best
antivirus for you:
Step 1: Make a list of your requirements
You have to assess your requirements and know all
about your operating system in order to know which
antivirus (for your PC, Business or Mobile ). For
example, if you are looking for business features,
however, you will want offerings of a full suite such as
anti-spyware, spam filter, anti-virus and firewall.
For More Related Articles,
Please Visit
http://www.softexsw.com/en/articles.php

More Related Content

What's hot

Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking IT Department Akre
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 

What's hot (20)

Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Malware
MalwareMalware
Malware
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Ppt123
Ppt123Ppt123
Ppt123
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Malware
MalwareMalware
Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 

Viewers also liked

Juan salvador gaviota
Juan salvador gaviotaJuan salvador gaviota
Juan salvador gaviotaClaudia Soto
 
50th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 201050th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 2010Miqui Mel
 
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2Federico Ruvituso
 
alimentacion complementaria en el lactante
alimentacion complementaria en el lactantealimentacion complementaria en el lactante
alimentacion complementaria en el lactanteElvirarrr
 
Class.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.introClass.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.introRoss Tang
 
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012cootaxim
 
Presentación1
Presentación1Presentación1
Presentación1alidasonco
 
1 coleccion deejerciciosen word
1 coleccion deejerciciosen word1 coleccion deejerciciosen word
1 coleccion deejerciciosen wordclaudia landeta
 
Assessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingAssessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingfusonline
 
Learning outcomes
Learning outcomesLearning outcomes
Learning outcomesfusonline
 
Engaged learning and collaboration
Engaged learning and collaborationEngaged learning and collaboration
Engaged learning and collaborationfusonline
 
Ease of communication
Ease of communicationEase of communication
Ease of communicationfusonline
 
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchOVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchZaire Overton
 
Opc tema 1 - unidad I
Opc  tema 1 - unidad IOpc  tema 1 - unidad I
Opc tema 1 - unidad IOpc Udo
 

Viewers also liked (20)

Juan salvador gaviota
Juan salvador gaviotaJuan salvador gaviota
Juan salvador gaviota
 
50th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 201050th Annual Report of The European Free Trade Association 2010
50th Annual Report of The European Free Trade Association 2010
 
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2BLOQUE II-MICROCRISTIANDADES - GRUPO 2
BLOQUE II-MICROCRISTIANDADES - GRUPO 2
 
Confined Space Acces
Confined Space AccesConfined Space Acces
Confined Space Acces
 
alimentacion complementaria en el lactante
alimentacion complementaria en el lactantealimentacion complementaria en el lactante
alimentacion complementaria en el lactante
 
Girugamesh!
Girugamesh!Girugamesh!
Girugamesh!
 
Higiene postural
Higiene posturalHigiene postural
Higiene postural
 
Class.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.introClass.bluemix.overall.chapter.1.intro
Class.bluemix.overall.chapter.1.intro
 
vva stand down
vva stand downvva stand down
vva stand down
 
El colera
El coleraEl colera
El colera
 
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
INFORMACION CONTABLE COOTAXIM PORTAL TURISTICO DEL EJE CAFTERO AÑO 2012
 
Presentación1
Presentación1Presentación1
Presentación1
 
1 coleccion deejerciciosen word
1 coleccion deejerciciosen word1 coleccion deejerciciosen word
1 coleccion deejerciciosen word
 
Assessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & gradingAssessment, feedback, evaluation, & grading
Assessment, feedback, evaluation, & grading
 
Learning outcomes
Learning outcomesLearning outcomes
Learning outcomes
 
Engaged learning and collaboration
Engaged learning and collaborationEngaged learning and collaboration
Engaged learning and collaboration
 
Ease of communication
Ease of communicationEase of communication
Ease of communication
 
Short quiz consists
Short quiz consistsShort quiz consists
Short quiz consists
 
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - MarchOVERTON_ZAIRE_AWIU_2015_SUMMATION - March
OVERTON_ZAIRE_AWIU_2015_SUMMATION - March
 
Opc tema 1 - unidad I
Opc  tema 1 - unidad IOpc  tema 1 - unidad I
Opc tema 1 - unidad I
 

Similar to Know More about Your Enemies

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

Similar to Know More about Your Enemies (20)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
MALWARE
MALWAREMALWARE
MALWARE
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 

More from Softex Software House

شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...Softex Software House
 
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءالتعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءSoftex Software House
 
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولشرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولSoftex Software House
 
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتتعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتSoftex Software House
 
تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟Softex Software House
 
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىنظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىSoftex Software House
 
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshareكيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على SlideshareSoftex Software House
 
كتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةكتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةSoftex Software House
 
نظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسنظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسSoftex Software House
 
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتنظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتSoftex Software House
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيSoftex Software House
 

More from Softex Software House (20)

Mc updates june 2015
Mc updates june 2015Mc updates june 2015
Mc updates june 2015
 
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...شرح جزء ايجار المعدات  و السيارات و الماركبات و إدارة عقود الايجار   نظام الم...
شرح جزء ايجار المعدات و السيارات و الماركبات و إدارة عقود الايجار نظام الم...
 
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاءالتعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
التعامل مع المواقف الصعبة لمشاكل العملاء الغاضبين | تدريب خدمة العملاء
 
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترولشرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
شرح كامل لدورة إدارة حسابات المبيعات على نظام الماركت كنترول
 
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجياتتعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
تعرف على النظم التقنية والإدارة لشركة سوفتكس للبرمجيات
 
تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟تجنب الأخطاء الشائعة في إدارة المخازن؟
تجنب الأخطاء الشائعة في إدارة المخازن؟
 
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهىنظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
نظام ماركت كنترول _نظام إدارة المطاعم والمقاهى
 
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshareكيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
كيف يمكن أن يظهر محتوى اللغة العربية بأفضل صورة على Slideshare
 
كتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقيةكتابة سناريو للفيديوهات التسويقية
كتابة سناريو للفيديوهات التسويقية
 
نظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكسنظام إدارة العيادات _شركة سوفتكس
نظام إدارة العيادات _شركة سوفتكس
 
Softex_ Clinic Manager
Softex_ Clinic ManagerSoftex_ Clinic Manager
Softex_ Clinic Manager
 
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجياتنظام ترافل كنترول _شركة سوفتكس للبرمجيات
نظام ترافل كنترول _شركة سوفتكس للبرمجيات
 
Softex Travel Control
Softex Travel Control Softex Travel Control
Softex Travel Control
 
Social media in Business
Social media in BusinessSocial media in Business
Social media in Business
 
Email Spam vs. Email Marketing
Email Spam vs. Email MarketingEmail Spam vs. Email Marketing
Email Spam vs. Email Marketing
 
How Strong is Your Password?
How Strong is Your Password?How Strong is Your Password?
How Strong is Your Password?
 
Build Everlasting Relationship
Build Everlasting Relationship Build Everlasting Relationship
Build Everlasting Relationship
 
most used colors in Web Design
most used colors in Web Designmost used colors in Web Design
most used colors in Web Design
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكترونيتأثير البريد المزعج على التسويق عبر البريد الإلكتروني
تأثير البريد المزعج على التسويق عبر البريد الإلكتروني
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Know More about Your Enemies

  • 2. Know All about Your Enemies Whenever your computer starts acting weird and makes it difficult for you to work on, the first thing that comes to your mind is whether a virus has affected your computer. This issue is dedicated to explain the most common threats that you may face. It gives you some details to help treat the root cause of any problem. Here are some definitions on these threats: Malware is any malicious program or software that’s designed to exploit a computer user. Malware is basically an umbrella term covering computer viruses, worms, Trojan, spyware, rootkit etc. Virus replicates itself in computer memory when initiated by the user. They contain some malicious codes which can affect your files, your operating system or even your master boot records thereby making your computer start slow or not boot at all.
  • 3. Know All about Your Enemies Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system. Trojan horse is a program that appears useful by pretending to do certain things in foreground, but in reality they are working silently in background with the only objective of harming your computer and/or stealing valuable information. It penetrates your computer through downloading malicious software like keys, cracks, free illegal music, wares etc from an unknown source. A worm is an evolved form of a virus. Like virus, worms replicate and spread themselves but it happens on a bit larger scale. They not need a human action to replicate and spread and that’s what makes it more dangerous. It always seeks for network loopholes to replicate from computer to computer. Therefore, it is not recommended to download any email attachments or to click the links friends share with you in a chat window.
  • 4. Know All about Your Enemies (part II) Here are more details on these threats: Spyware , unlike any of the above, doesn’t harm your computer in any way. Instead, they attack you! Once installed on a system they run in background and keep on collecting user’s personal data. These data can include your credit card numbers, passwords, important files and any other personal stuff. It is always advisable to download and install software from trusted sources. A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. It is worth-knowing that crackers use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, crackers may use Trojan horses, worms, or other methods.
  • 5. Pick up Your Armor and Face Your Enemies Through the previous issues of Softex newsletter, you were introduced to your enemies and were given detailed description on each of them. I believe now you need your shining armor and sword to confront these vicious threats. In this case, regular scanning and an effective antivirus system are essential for the security of your system, which prevents damage and data loss. The following steps will guide you to choose the best antivirus for you: Step 1: Make a list of your requirements You have to assess your requirements and know all about your operating system in order to know which antivirus (for your PC, Business or Mobile ). For example, if you are looking for business features, however, you will want offerings of a full suite such as anti-spyware, spam filter, anti-virus and firewall.
  • 6. For More Related Articles, Please Visit http://www.softexsw.com/en/articles.php