Cable Lock - one of the simplest ways to protect your laptop from physical theft, Malware - any program or code designed to do something undesirable on a system or network, Worm - can replicate on its own through networks, Virus - does not self-replicate across networks, Trojan Horse - pretends to do one thing while doing something evil, Keylogger - records user's keystrokes and makes that info available to the programmer, Rootkit - takes advantage of very low-level operating system functions to hide itself, Spyware - can use your computer’s resources to run distributed computing applications, steal passwords, etc, Botnet - network of infected computers under the control of one person or group, Spoofing - process of pretending to be someone or something you are not, Zero-Day Attack - attack on a vulnerability not already known to the software developers, Pop-Ups - surprise browser windows that appear automatically when you visit a website, Brute Force - any attempt to guess the contents of some kind of data field that isn’t obvious, Spam - unsolicited emails from both legitimate businesses and scammers, Drive-By Downloads - undesired file downloads generated by malicious websites and ads,
0%
Securing Computers Review
共享
由
Jzelenkov
Vocational / Technical
编辑内容
嵌入
更多
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
匹配游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?