MALWARE?
WHAT IS IT?
WHAT IS MALWARE?
malware is software that is intended to damage or disable computers and computer systems, to prevent malware you can use different anti virus softwear.
KEY LOGGING...
Keystroke logging (often called key logging) is the action of tracking (or logging) the keys struck on a keyboard, hackers usually use key logging to track your passwords and other personal details.
VIRUS...
A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. A computer virus is a program that spreads malicious codes by copying itself and infecting host computers. although some viruses are latent, others can corrupt data or impede system performance.
TROJAN HORSE...
Named after the Trojan Horse of ancient Greek history, a Trojan is a network software application designed to remain hidden on an installed computer. Trojans generally serve malicious purposes and are therefore a form of malware, like viruses. Trojans sometimes, for example, access personal information stored locally on home or business computers, then send these data to a remote party via the Internet.
SPYWARE...
Programs that secretly record what you do on your computer are called spyware. They can be used for some perfectly legitimate purposes, but the majority of spyware is malicious. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters.
ADWARE...
Adware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser. Most adware is safe to use, but some can serve as spyware, gathering information about you from your hard drive, the Web sites you visit, or your keystrokes. Spyware programs can then send the information over the Internet to another computer. So be careful what adware you install on your computer.
FIREWALL...
A firewall is a device that controls the flow of communications across networks of computers by examining their source, destination and type - and comparing these with predetermined lists of allowed and disallowed transactions. You need a firewall because once you're on broadband, your computer is continuously connected to the global internet and identified by a unique number - its IP address. So it's potentially visible to anyone else on the network, and malicious users may be able to gain access to it.