Cable Lock, one of the simplest ways to protect your laptop from physical theft, Malware, any program or code designed to do something undesirable on a system or network, Worm, can replicate on its own through networks, Virus, does not self-replicate across networks, Trojan Horse, pretends to do one thing while doing something evil, Keylogger, records user's keystrokes and makes that info available to the programmer, Rootkit, takes advantage of very low-level operating system functions to hide itself, Spyware, can use your computer’s resources to run distributed computing applications, steal passwords, etc, Botnet, network of infected computers under the control of one person or group, Spoofing, process of pretending to be someone or something you are not, Zero-Day Attack, attack on a vulnerability not already known to the software developers, Pop-Ups, surprise browser windows that appear automatically when you visit a website, Brute Force, any attempt to guess the contents of some kind of data field that isn’t obvious, Spam, unsolicited emails from both legitimate businesses and scammers, Drive-By Downloads, undesired file downloads generated by malicious websites and ads.
0%
Securing Computers Review
Del
Del
Del
af
Jzelenkov
CTE
CS
Rediger indhold
Trykke
Integrere
Mere
Tildelinger
Rangliste
Vis mere
Vis mindre
Denne rangliste er i øjeblikket privat. Klik på
Del
for at gøre det offentligt.
Denne rangliste er deaktiveret af ressourceejeren.
Denne rangliste er deaktiveret, da dine muligheder er forskellige fra ressourceejerens.
Indstillinger for gendannelse
Match op
er en åben skabelon. Det genererer ikke resultater for en rangliste.
Log ind påkrævet
Visuel stil
Skrifttyper
Kræver abonnement
Indstillinger
Skift skabelon
Vis alle
Der vises flere formater, mens du afspiller aktiviteten.
Åbne resultater
Kopiér link
QR-kode
Slette
Gendan automatisk gemt:
?