Lycee Khadija Oum El Mouminine - Tétouan - Maroc Index du Forum
Lycee Khadija Oum El Mouminine - Tétouan - Maroc
ثـانـويـة خـديـجـة أم الـمـؤمـنـيــــــــن
Lycee Khadija Oum El Mouminine - Tétouan - Maroc Index du ForumFAQRechercherMembresGroupesProfilS’enregistrerConnexion

 Forum du Lycée Khadija Oum El Mouminine - Tetouan- Maroc مـنـتـدى ثـانـويـة خـديـجـة أم الـمـؤمـنـيـن - تــطـوان - الـمغـرب  
عزيزي الضيف أو الزائر مرحبا بك , إذا كنت غير غير مسجل في منتدى ثانوية خديجة أم المؤمنين ... إشتـــرك وإستفد من مزايـــا العضويــة، الرجــاء إضغط على زر الإشتراك أعلاه قريبا . . .
4 type malware

Poster un nouveau sujet   Répondre au sujet    Lycee Khadija Oum El Mouminine - Tétouan - Maroc Index du Forum -> Programmes Scolaire المقرر المدرسي -> Informatique المعلوميات
Sujet précédent :: Sujet suivant  
Auteur Message

Hors ligne

Inscrit le: 05 Mar 2017
Messages: 9
Classe: TCS6
Point(s): 24
Moyenne de points: 2,67

MessagePosté le: Mer 3 Mai - 08:29 (2017)    Sujet du message: 4 type malware Répondre en citant

Virus – like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware – just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system – which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms – similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan – like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren’t downloading any programs or applications illegally at the office – as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help

2 types antivirus.
•Les principaux antivirus du marché se concentrent sur des fichiers et comparent alors la signature virale du virus aux codes à vérifier ;
•La méthode heuristique est la méthode la plus puissante, tendant à découvrir un code malveillant par son comportement. Elle essaie de le détecter en analysant le code d'un programme inconnu. Parfois de fausses alertes peuvent être provoquées ;

2 types anti malware
First, Anti Malware is installed on the victim's computer, usually with the help of another Trojan. Typical sources of an AntiMalware infection may include unsafe advertisements that exploit security vulnerabilities in Java or Flash, fake video codecs on pornographic video websites and fake versions of popular files on file sharing networks.
2.Once installed, AntiMalware makes changes to the Windows registry that allow AntiMalware to run automatically upon start-up. AntiMalware also alters your computer's settings so that AntiMalware will have the capacity to display error messages, system notifications and security alerts, as well as being able to connect to the Internet, block specific applications and crash your computer unexpectedly
Revenir en haut

MessagePosté le: Mer 3 Mai - 08:29 (2017)    Sujet du message: Publicité

PublicitéSupprimer les publicités ?
Revenir en haut
Montrer les messages depuis:   
Poster un nouveau sujet   Répondre au sujet    Lycee Khadija Oum El Mouminine - Tétouan - Maroc Index du Forum -> Programmes Scolaire المقرر المدرسي -> Informatique المعلوميات Toutes les heures sont au format GMT
Page 1 sur 1

Sauter vers:  

Index | creer un forum | Forum gratuit d’entraide | Annuaire des forums gratuits | Signaler une violation | Conditions générales d'utilisation
Powered by phpBB © 2001, 2005 phpBB Group
Traduction par :
Thème Pluminator imaginé et réalisé par Maëlstrom