* Worm - Menduplikatkan itself on your hard drive. This makes the computer resources (hard drive) into the worm's full.
* Trojan - Capture data on infected computers and sends itself to the trojan creator.
* Hacking - is a direct attack from hackers for computer users who access certain Internet pages, with or without the assistance programs that have been inserted in the user's computer.
* Backdoor - Almost the same as a trojan. However, Backdoor usually resembles the files fine. For example games.
* Spyware - Virus that monitors the infected computer.
* Rogue and Ransomware - is a program that mimics the antivirus program and show antiviral activity like normal, and giving false warnings about the presence of viruses. The goal is to let users buy and activate the fake antivirus program and make money for those rogue virus maker.
* Rootkit - A virus that works like an ordinary computer system working alone.
* Polymorphic Viruses Viruses are fond beubah change order can not be detected.
* Cell Phone Virus - a virus that runs in a special cell phone, and can cause various effects, ranging from cell phones destroying, stealing data in cell phones, to make calls in secret and spend credit cell phone users .

Related Post
computer
- ROM and NVRAM
- RAM Memory
- Detecting Damage Hardisk
- Computer Science
- Config.sys is a file in MS-DOS operating system
- MS-DOS version 7.xx
- MS-DOS version 6.xx
- MS-DOS version 5.xx
- MS-DOS version 4.xx
- MS-DOS version 2.xx
- MS-DOS version 1.xx
- MS-DOS
- DoS ( Disk Operating System )
- Moore's Law
- microprocessor
- Universal Serial Bus (USB)
- Disk , floppy disk
- Booting and Processing
- BIOS
- Flash memory (flash memory)
- Electrically Erasable Programmable Read-Only Memory, is written also with E2PROM
- Mask ROM
- Read-only memory (ROM)
- Magnetic Storage
- (RAM) Random access memory
0 comments:
Post a Comment