Page 94 - TP-Play_V-2.0_Book-8
P. 94

Backdoor

            Backdoor is a type of malicious software which enters into the computer through bundled with
            other software or files. It is used to gain remote access to the host computer.


             Tech


               Funda
                                  Most of the malware programs are distributed over the Internet, often
                                bundled with  other software.
                                 The best way to guard against malware is to install antivirus software.



                ANTIVIRUS

            An antivirus program is a software which can detect the presence of a virus on a computer and
            remove the virus. Eradicating a virus is the term used for cleaning a computer.

            There are several methods of eradication:
            ✶  Removing the code in the infected file which corresponds to a virus.

            ✶  Removing the infected file.
            ✶  Quarantining the infected file, which involves moving it to a location where it cannot be run.

            ✶  Inform the user about the presence of the malware and the action that has been taken.
            ✶  Separate all the infected files and applications so that the infection cannot spread further.

            Some well-known  antivirus  programs  are  Norton,  AVG,  McAfee,  Symantec,  SmartDog,
            Kaspersky, etc.

                FIREWALL

            The term ‘firewall’ originally referred to a wall intended to confine a fire or potential fire within a
            building. In computer, a firewall is a software or hardware-based network security system that

            controls the incoming and outgoing network traffic based on applied rule set. A firewall acts like
            a gatekeeper and prevents unauthorised access to a computer network. It inspects every data
            packet that arrives at a network and decides, on the basis of a set of predefined rules whether to

            pass or not. Firewall  establishes a barrier between a trusted, secure internal network and another
            network (for example, the Internet) that is not assumed to be secure and trusted.

                Recap




                     Computer safety refers to the protection  of computer-based  resources against

                    unauthorised use or physical damage.
                     Authentication is the process of verifying a user’s identity before granting him or her
                    access to a computer system.



             94       Play (Ver. 2.0)-VIII
   89   90   91   92   93   94   95   96   97   98   99