Threats of Malicious Software in Social Computing
2014年3月20日 星期四
References
›
1. "What is Malware?" n.d. In Website Defender. Retrieved March 19, 2014, from http://www.websitedefender.com/what-is-malware/ 2. ...
Exercise Section
›
Q1. What is scan malware signature method? Ans: This method used with some anti-virus software, because programmers or software it will c...
Conclusion
›
After the three examples mentioned in the blog, we discovered that there are many kinds of malicious softwares. Technological advances every...
What is Trojan Horse?
›
Trojan horse is a backdoor. The hacker via the Trojan Horse to collect some information from computer, such as credit card numbers, bank ac...
What is Social Computing?
›
Social Computing is a term comes from Computer Science. It describes person having social activity through the Internet. At present, Socia...
What is Malicious Software?
›
Have you ever heard about Trojan Horses? Trojan Horses is a kind of Malicious software. Malicious software, another name we called, Ma...
Worm.Whboy
›
What is Worm.Whboy? Worm.Whboy is a variants computer worm. It created by Li Jun in October 16, 2006 . Li was sold to more than 1...
›
首頁
查看網路版