IT 244 Week 8 - DQ 2 - 7785

Solution Posted by
3number
Solution Detail
Price: $2.00
  • From: ,
  • Posted on: Fri 13 Apr, 2012
  • Request id: None
  • Purchased: 0 time(s)
  • Average Rating: No rating
Request Description

Spyware- Spyware looks at everything that is accomplished on a computer. It knows the websites one has visited, the way one browses the computer, it adds software and it can also change the homepage.  A good way to remove the spyware is by installing Antispyware software. 

 

Trojan Horse- Trojan Horse received its name from the famous Trojan Horse in Greek Mythology.  This software usually hides itself inside of a folder and tries to trick the computer user.  This malicious software will only complete the job if it is started by the computer user.

 

Worm- A worm will contaminate the computer and turn the computer into a zombie.  This computer is then controlled by the hacker and is utilized to perform the DDoS attack. Example: The Confickr Worm

 

Virus-I believe a virus is the most common and most famous malicious software out there.  The virus software duplicates itself in ones computer system and infects files that one will no longer be able to use.  The word virus also used to describe other malware such as Worms and Trojan Horse, but it is not the same.

 

Adware- Some say that adware is categorized along with spyware and others say that spyware is its own category.  Either way, adware is a software that shows advertising and be inside ones computer system legally.  All the pop-ups that occur while browsing the internet can be caused by adware.

 

 

 

 

 

Solution Description

Spyware- Spyware looks at everything that is accomplished on a computer. It knows the websites one has visited, the way one browses the computer, it adds software and it can also change the homepage.  A good way to remove the spyware is by installing Antispyware software.