Virus & Spyware
What does DROWN stand for? How does it harm the computer and the user? What are the ways to protect the device from this attack?
- 421 views
- 2 answers
- 1 votes
What are the methods to protect your computer from a virus or any other type of attack? Are these methods same as those applied for protection from a Trojan Horse?
- 406 views
- 2 answers
- 1 votes
The DOS and DDOS attacks are the same attacks with two aliases or are they two different types of attacks? If yes, then how are they different from each other?
- 747 views
- 2 answers
- 0 votes
What are the different types of DOS attacks? Are they the same? In what way do they differ from each other?
- 702 views
- 2 answers
- 0 votes
Why do DOS or DDOS attacks take place? What is the motive of the individuals who make it happen? What do they gain by performing this attack?
- 721 views
- 2 answers
- 1 votes
How do you prevent a Trojan Horse attack on a computer or any similar device? Are these methods always functional? Or do they fail sometimes?
- 645 views
- 2 answers
- 1 votes
How badly does a Trojan Horse effect the device which it enters? Does the extent of the attack remain same on all computers or does it vary from PC to PC?
- 815 views
- 2 answers
- 1 votes
How does the Trojan Horse attack a processor or a computer in general?How does it enter the computer or any other device? Does it spread or no?
- 360 views
- 2 answers
- 2 votes
What do you mean by a computer virus, a worm, and a Trojan horse? What is the difference between each one of them?
- 449 views
- 2 answers
- 1 votes
What do you mean by the term malware and what does adware mean? What is the difference between these two?
- 372 views
- 2 answers
- 2 votes