Hi Everybody, Today we are going to cover all about Trojan Horse, Spyware, Malware, Phishing, Computer Worm, Adware, Rootkit, and Firewall. Which is really important to know about it, If you are in a Computer Science field. While some of them are important to protect our privacy and some of them are not. So, Today we are going to learn this whole thing.
8. Trojan Horse
As many of you don't be aware of the term "Trojan Horse" if you are new in this Tech Field. Trojan Horse is a malicious program that is coded by a programmer or hacker to access your computer system and steal your personal information. In fact, Trojan Horse can also call as anonymous who get accessed to your system without your information and you get unexpected changes on your system which you haven't changed it. Interestingly, Trojan Horse doesn't act like Virus or Worms. It doesn't reproduce by itself and it doesn't replicate by itself like a virus does. While, Trojan Horse can also be preferred as a virus which acts as a virus does, but very much different from a virus.
7. Spyware
Spyware is a software which is designed by a hacker or programmer to access personal information about user's which can include your passwords, credit card details, username and much more private details can leak. As you might be wondering why I would install this harmful software on my PC? Spyware is a software which gets installed in your system without a user information. Eventually, these type of harmful software comes with pirated software's which is available on the internet. Some of you have downloaded these type of pirated software which can include spyware. Like everybody has his own privacy which can't be publicly exposed and some of your concern about your privacy. So, those people should consider the term "Spyware" because it is designed to steal personal information of a user without any information.
6. Malware
Malware is a software which is created to cause damage or serious issues to your computer system. Which basically means disturbing proper functioning of your PC like a virus does. While, as you know malware is a malicious software which can be include virus, worms, trojan horse etc. it is totally dependent on the creator of that malware. Malware can also be preferred as a tech disaster for your system because it basically fully damage your computer system. While, malware can spread through online scams through e-mail, pirated software's, online document attachments etc. As there are many ways that virus can spread, only the thing you should be aware of this and be aware of everything about security.
5. Phishing
As you don't know every hacker has some advanced skills like social engineering because it plays a very important role in the phishing attack. Phishing is a social engineering attack which popularly takes place in online platforms like e-mail. It also often used to gather personal information of a user through online scams. Basically, this is done by sending fraud e-mails to a user which looks like the company has sent for us. Phishing e-mails have some attachments like some PDF files or anything like image or music file and some malicious links. Using social engineering skills the recipient is then tricked to click that malicious link which leads to the installation of harmful software like worms, spyware, malware anything which can destroy your computer system.
Phishing example- Some of you may receive an e-mail which claims that your password is about to expire in 2 hrs and many of you click on that malicious link to recover your password which after automatically installs malware or harmful software without any user information.
Phishing example- Some of you may receive an e-mail which claims that your password is about to expire in 2 hrs and many of you click on that malicious link to recover your password which after automatically installs malware or harmful software without any user information.
4. Computer Worm
Computer Worm is a malicious program which replicates by itself in a processed manner and also spread to other computer systems through pen drive, USB flash drive, software, memory card and also device to device. Interestingly, it uses the network to spread itself. So, How does the worm spread? The worm spread through operating systems like it can also spread through pirated software like many of you uses pirated operating systems. Although, it replicated without any user interaction. The big example of worms is WannaCry Ransomware Virus which exploited too many systems and caused to serious damages to computer system worldwide.
3. Adware
As you may assume that adware is relevant to advertising. Adware is a software which is designed to display the unwanted ads like many of you have seen pop-up ads that are called adware. Interestingly it doesn't steal your personal information and doesn't cause any damage to your computer system. Adware is just used for fake advertisement through websites. Especially in insecure websites. Adware can also be found in mobile devices in different browsers. While Adware has earlier been criticized because it can include some malicious code which can steal your personal information. If you want to avoid adware in your browser you can block pop-up ads on your browser settings.
2. Rootkit
Again many of you may assume that rootkit is a kit of malicious software or code. True, Rootkit is a kit of different types of malicious software which can include worms, virus, spyware, malware etc. The rootkit can spread through pirated software or from an unauthorized user. Through this, the creator of that rootkit can get full access to your computer system. While these type of harmful software or codes come together from pirated or cracked software.
1. Firewall
In Computing world, Firewall is a network security system which monitors and keeps securing the system from malicious software, basically firewall is designed from the set of rules which will monitor the system whenever you install the new software. If anything found malicious firewall will block some features of that software to secure your systems. Firewall is just like the border of your system in which malicious software cannot enter in your system. sometimes, You can give access to that software if you trust it. There are three types of firewalls:-
1. Packet Filtering Firewall.
2. Stateful Inspection Firewall.
3. Proxy Firewall.
4. Next Generation Firewall.
ALSO, CHECK OUT THIS
Top 10 Most Destructive Computer Virus
All About Taxes- GST, VAT, Service Tax, Income Tax and more
Top 10 Ways To Earn Money Online in 2018
All About Taxes- GST, VAT, Service Tax, Income Tax and more
Top 10 Ways To Earn Money Online in 2018
2 Comments
Make a series on how to earn money from blog
ReplyDeleteGreat video very soon
DeleteComment here