Hardware Reference
In-Depth Information
InPrivate Browsing.
A new Internet Explorer window opens, along with a message letting you know that
InPrivate Browsing is enabled, and an indicator appears on the Address bar. Close the
browser window when you're fi nished.
To turn on InPrivate Browsing in Internet Explorer, choose Tools
Understanding and Preventing
Malware Attacks
Malware is a broad term used for many attacks on computer systems. It's shorthand
for malicious software, and it covers anything that has been installed on anyone's computer
without their consent and is intended for mischief. When thinking about malware, you
should consider the following:
Exploits These take advantage of fl aws in the OS or an application.
Viruses These are used to cause damage and/or disruption.
Worms These are used to transmit malware.
Trojan Horses These are applications that mask their true intent.
Adware These are used to display unwanted advertisements.
Spyware These are used to report on your computer and possibly steal data.
Rootkits These conceal themselves on the host OS.
Backdoors These open ports or other routes into your system.
Keyloggers These record every keystroke and then use that data for identity theft.
Botnets These are used to harvest the processing resources of many Internet-connected
computers for often-illegitimate purposes.
In the following sections, you'll learn more about several types of malware, and you'll
fi nd out how antivirus, antispyware, and antispam applications help you combat them.
Mac and Linux systems aren't completely immune to malware attacks, but
Windows systems run a greater risk of infection.This is partly because some
computer-hacking criminals have an axe to grind against Microsoft, and partly
because Windows is the most widely used OS, so any financial gain a criminal
might get from malware would be maximized by targeting Windows systems.
OS and Application Exploits
All OSs and applications have potential vulnerabilities that criminals can exploit.
A vulnerability exists when a fl aw in the programming creates the potential for misuse,
Search WWH ::




Custom Search