
Activity 5.7: the Klez virus
The Klez virus is at its ninth year of existing across the World Wide Web experts state that it maybe provider of new viruses of combination of pernicious approaches from pc to another anti virus software makers Symantec and McAfee both report that there’s at least 2000 new infections everyday with no sign or letups.
How it works:
Klez is the example of what we call a blended threat, a software that acts like it distributes itself portraying a virus but pretends but sometimes behaves like a worm and at other times like a TROJAN HORSE.Klez normally arrives in in-boxes of unexpected victims as a file attachment it uses tricky names like “Klez removal tool”. When the victim double clicks the attachment or even views it Then well your stuffed!!!
Activity 5.7: the Klez virus
Trojan horse vs. Klez
· Trojan horses are designed to let a hacker access to a targets computer system.
· Klez infects Microsoft systems.
· Trojan horse can control another computer system.
· Klez comes through an email even viewing it activates it.
· Trojan horse can control components like downloading software’s.
Shield Deluxe 2009
$19.99
Go To
Read
Free
Webroot 6.0
$39.95
Go To
Read
Free
BitDefender
$29.95
Go To
Read
Free
CA 2009
$49.99
Go To
Read
Free
McAfee 2009
$39.99
Go To
Read
Norton 2009
$39.99
Go To
Read
ESET NOD 32 3.0
$39.99
Go To
Read
Free
Free
CA 2009
$49.99
Go To
Read
Free
The Klez virus is at its ninth year of existing across the World Wide Web experts state that it maybe provider of new viruses of combination of pernicious approaches from pc to another anti virus software makers Symantec and McAfee both report that there’s at least 2000 new infections everyday with no sign or letups.
How it works:
Klez is the example of what we call a blended threat, a software that acts like it distributes itself portraying a virus but pretends but sometimes behaves like a worm and at other times like a TROJAN HORSE.Klez normally arrives in in-boxes of unexpected victims as a file attachment it uses tricky names like “Klez removal tool”. When the victim double clicks the attachment or even views it Then well your stuffed!!!
Activity 5.7: the Klez virus
Trojan horse vs. Klez
· Trojan horses are designed to let a hacker access to a targets computer system.
· Klez infects Microsoft systems.
· Trojan horse can control another computer system.
· Klez comes through an email even viewing it activates it.
· Trojan horse can control components like downloading software’s.
Shield Deluxe 2009
$19.99
Go To
Read
Free
Webroot 6.0
$39.95
Go To
Read
Free
BitDefender
$29.95
Go To
Read
Free
CA 2009
$49.99
Go To
Read
Free
McAfee 2009
$39.99
Go To
Read
Norton 2009
$39.99
Go To
Read
ESET NOD 32 3.0
$39.99
Go To
Read
Free
Free
CA 2009
$49.99
Go To
Read
Free
0 comments:
Post a Comment