- Jul 22, 2012
- 317
PRIZES
Activation code for TrustPort USB Antivirus for 1-year,Activation
code for TrustPort Antivirus for 6-months,
promo code 70% off for TrustPort Total Protection
http://www.trustport.com/game/index.html
Some answers you may also get these questions answered by some other players just posting to ease some of your works-
#1- Don't be bitten by baiting.
Baiting is a real world trojan horse that uses physical media and relies on the curiosity of the victim. The attacker leaves a malware infected USB flash drive in a location sure to be found and gives it a legitimate looking label, and waits for the victim to use the infected device. if a user inserts this device into their PC, they will install malware without knowing.
#2 - Do you know hwy you should be afraid of keystroke logging?
Keystroke logging, often referred to as keylogging, is the action of recording or logging keys struck on a keyboard, typically so that the person using the keyboard is unaware that their actions are being monitored. this means the attacker can easily gain sensitive information such as passwords.
#3- Do you know which type of software gathers your private information?
Spyware is mostly used for purposed such as tracking and storing internet user's movement on the web and serving up pop-up ads to the internet users. spyware can collect almost any type of data, including internet surfing habits, user logins, and bank account or credit card information.
#4- You can come across hijacking not only on the board of an airplane
Hijacking is the modification of a web browser's settings by malware, spyware or a virus. a browser hijacker may replace the existing web page with its own. these are generally used to force hits to a particular website. some browser hijacking can be easily reversed, while other instances may be difficult to reverse.
Activation code for TrustPort USB Antivirus for 1-year,Activation
code for TrustPort Antivirus for 6-months,
promo code 70% off for TrustPort Total Protection
http://www.trustport.com/game/index.html
Some answers you may also get these questions answered by some other players just posting to ease some of your works-
#1- Don't be bitten by baiting.
Baiting is a real world trojan horse that uses physical media and relies on the curiosity of the victim. The attacker leaves a malware infected USB flash drive in a location sure to be found and gives it a legitimate looking label, and waits for the victim to use the infected device. if a user inserts this device into their PC, they will install malware without knowing.
#2 - Do you know hwy you should be afraid of keystroke logging?
Keystroke logging, often referred to as keylogging, is the action of recording or logging keys struck on a keyboard, typically so that the person using the keyboard is unaware that their actions are being monitored. this means the attacker can easily gain sensitive information such as passwords.
#3- Do you know which type of software gathers your private information?
Spyware is mostly used for purposed such as tracking and storing internet user's movement on the web and serving up pop-up ads to the internet users. spyware can collect almost any type of data, including internet surfing habits, user logins, and bank account or credit card information.
#4- You can come across hijacking not only on the board of an airplane
Hijacking is the modification of a web browser's settings by malware, spyware or a virus. a browser hijacker may replace the existing web page with its own. these are generally used to force hits to a particular website. some browser hijacking can be easily reversed, while other instances may be difficult to reverse.