Avatar billede tiger_dk Mester
06. december 2006 - 18:37 Der er 11 kommentarer og
1 løsning

Forskellen på de mange trusler!!

Hej !

Jeg er endlig gået og tænkt over, hvad er forskellen på de forskellige trusler findes på computeren, hvad gør de forskllige på de forskellige og hvad er mere farlige end den anden ?


Virus          Hvad laver den af revagese
Orm            Hvad laver den af revagese
Troanske hest  Hvad laver den af revagese
Maleware        Hvad laver den af revagese
Spyware        Hvad laver den af revagese
osv...          Hvad laver de af revagese


Mvh
tiger_dk
Avatar billede dragonknight Juniormester
06. december 2006 - 18:59 #1
A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria:


It must execute itself. It often places its own code in the path of execution of another program.
It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike.
Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video, and audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.
Avatar billede dragonknight Juniormester
06. december 2006 - 19:00 #2
Trojan horses are impostors—files that claim to be something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojan horses contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must invite these programs onto your computers; for example, by opening an email attachment or downloading and running a file from the Internet. Trojan.Vundo is a Trojan horse.
Avatar billede dragonknight Juniormester
06. december 2006 - 19:00 #3
Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm W32.Mydoom.AX@mm is an example of a worm
Avatar billede tiger_dk Mester
06. december 2006 - 19:02 #4
ikke fordi jeg godt kan engelsk, men findes der her også på dansk !
Avatar billede dragonknight Juniormester
06. december 2006 - 19:28 #5
Jeg tog det direkte fra Norton
Avatar billede tiger_dk Mester
06. december 2006 - 19:32 #6
ok, læg et svar, det var en fejl at jeg lagede et !
Avatar billede dragonknight Juniormester
06. december 2006 - 19:36 #7
Ping :-)
Avatar billede tiger_dk Mester
06. december 2006 - 19:37 #8
pong, så !!
Avatar billede dragonknight Juniormester
06. december 2006 - 19:39 #9
Virus knytter sig typisk til programfiler, dokumenter (makrovirus) eller disketter (bootvirus). Smitten overføres, når man udveksler de inficerede programmer, dokumenter eller disketter med andre pc-brugere. Den bedste kur mod virus er et opdateret antivirusprogram, der analyserer pc'ens filer og sammenligner dem med en database over kendte virus.
Avatar billede dragonknight Juniormester
06. december 2006 - 19:40 #10
Avatar billede dragonknight Juniormester
06. december 2006 - 19:40 #11
Den er på dansk
Avatar billede tiger_dk Mester
06. december 2006 - 19:41 #12
takker !
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester