Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 18
Page 368
... Malware Malware is a generic term that refers to any type of malicious software . Malware pro- grams are intentionally written to perform destructive acts , although some researchers believe that many young malware creators do not ...
... Malware Malware is a generic term that refers to any type of malicious software . Malware pro- grams are intentionally written to perform destructive acts , although some researchers believe that many young malware creators do not ...
Page 370
... malware creator . In either case , this information is typically used in illegal activities . Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal , but it is considered ...
... malware creator . In either case , this information is typically used in illegal activities . Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal , but it is considered ...
Page 377
... malware programs can open the ports and send data from your PC to a hacker at the hacker's request . To protect against becoming infected with a computer virus or other type of malware , all PCs in both homes and offices should have ...
... malware programs can open the ports and send data from your PC to a hacker at the hacker's request . To protect against becoming infected with a computer virus or other type of malware , all PCs in both homes and offices should have ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML