Page 86 - Trackpad v5 class 5
P. 86
How do Trojan Horses Work?
They are received as an e-mail attachment from someone we know and appears legitimate.
Once you click the attachment, download and install it, the malware also gets installed
into the computer.
Effects of Trojan Horse
Like viruses and worms, they may
destroy the data and affect the Where does Trojan horse gets its name?
performance of the computer.
RANSOMWARE
Ransom is the money demanded to release the hostage kidnapped for the purpose.
Similarly, ransomware is malicious software used to access the data of the host system
illegally by encrypting it. The victim of the host system has to pay a huge amount of money
to the attacker to get back access to data.
HOW CAN WE PROTECT OUR COMPUTERS?
Install an antivirus program and ensure that it is updated timely.
Never allow any CD, DVD or pen drive brought from an untrusted source to be used directly
on the computer without scanning for viruses.
Never open e-mail attachments received from strangers.
Make sure the software on your computer is updated, including the operating system
and browsers.
Use the original operating system.
Do not download music, program or games from unknown sources on the Internet.
ANTIVIRUS SOFTWARE
An antivirus program detects the changes that a virus has caused in the computer. It is
recommended to install a good antivirus program to safeguard our computer from any
virus that may enter and update it consistently. Antivirus detects the presence of a virus,
warns us of the same and works to deactivate the malware.
FEATURES OF ANTIVIRUS
Antivirus programs contain an automatic update feature that prompts the user to update
the antivirus program from time to time because there are viruses being replicated every
day, hence, it is necessary to update the antivirus regularly to handle these threats.
84 Pro (Ver. 5.0)-V

