Search
Recommended Sites
Related Links






Valid XHTML 1.0 Transitional

Valid CSS!
   

Informative Articles

Laptop Computer Extras for the Mobile Traveler
A laptop computer certainly provides you with an unprecedented level of freedom and mobility away from the office. However there are a few extras you might want to bring along on your laptop travels: Extra 1: portable printer If you travel a...

Protect Your Computer And Your Personal Information From Spyware
Spyware is a broad term used for certain types of software that are downloaded onto your computer without your knowledge. Malware has become a phrase that is used when describing spyware and adware. Spyware is placed on your computer in order to...

Computer Geeks and Garden Gnomes
First and foremost before I begin my ranting it is worth mentioning that there are many very helpful and considerate people out there in the cyber wilderness who devote much of their time to providing open source and free scripts of all variations...

HOW TO GET THE COMPUTER YOU WANT WITHOUT SPENDING A FORTUNE
HOW TO GET THE COMPUTER YOU WANT WITHOUT SPENDING A FORTUNE By M. Nasser Bey I have been using computers for years now and have never owned a new one. Like many people I had little money when I started looking for a machine. Back in the early...

10 Simple Ways to Lower Your Small Business Computer Support Bills This Summer
Article Title: 10 Simple Ways to Lower Your Small Business Computer Support Bills This Summer Author: Joshua Feinberg Contact/Author: mailto:customersvc@smallbiztechtalk.com Joshua Feinberg Web Site Address: http://www.smallbiztechtalk.com...

 
Different Types of Computer Infection!

Different Types of Computer Infection!

When you listen to the news, you hear about many different forms of electronic infection. The most common are:
Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.

E-mail viruses - An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.

Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.

About the author:

http://www.a1-sypware-4u.info/



Sign up for PayPal and start accepting credit card payments instantly.