Threats of Malicious Software in Social Computing

2014年3月20日 星期四

References

›
1. "What is Malware?" n.d. In Website Defender. Retrieved March 19, 2014, from http://www.websitedefender.com/what-is-malware/ 2. ...

Exercise Section

›
Q1. What is scan malware signature method? Ans: This method used with some anti-virus software, because programmers or software it will c...

Conclusion

›
After the three examples mentioned in the blog, we discovered that there are many kinds of malicious softwares. Technological advances every...

What is Trojan Horse?

›
Trojan horse is a backdoor. The hacker via the Trojan Horse to collect some information from computer, such as credit card numbers, bank ac...

What is Social Computing?

›
Social Computing is a term comes from Computer Science. It describes person having social activity through the Internet. At present, Socia...

What is Malicious Software?

›
Have you ever heard about Trojan Horses? Trojan Horses is a kind of Malicious software. Malicious software,  another name we called, Ma...

Worm.Whboy

›
What is Worm.Whboy?   Worm.Whboy is a variants computer worm. It created by Li Jun in October 16, 2006 . Li was sold to more than 1...
›
首頁
查看網路版

著作人

  • LOK樂
  • SKY
  • Unknown
  • `maggie
技術提供:Blogger.