Computer security
Malicious hackers are increasingly developing powerful software crime tools such as automatic computer virus generators, Internet eavesdropping sniffers, password guessers, vulnerability testers, and computer service saturators.
For example;
An Internet eavesdropping sniffer intercepts Internet messages sent to other computers.
A password guesser tries millions of combinations of characters in an effort to guess a computer’s password.
Vulnerability testers look for software weaknesses.
These crime tools are also valuable security tools used for testing the security of computers and networks.
Friday, January 16, 2009
Subscribe to:
Post Comments (Atom)
related story:
Search Engine
Search Engine, computer software that compiles lists of documents, most commonly those on the World Wide Web....story...Service Provider
Service Provider, company that sells computer access to the Internet, also called Internet service provider.... story...Tel-Net
Telnet, protocol, or set of procedures, that enables a user of one computer on the Internet to log on to any other .....story...Spider Web
Spider (computer), computer program that automatically monitors documents (called Web pages) on the .......story...Microsoft
The (MSN), collection of World Wide Web sites operated by Microsoft Corporation that provide news, .................story...Mark-up Language
In computer science, a text-formatting language used by publishers and multimedia industries to solve prob....story...>
No comments:
Post a Comment