Technology in Action
Pearson Prentice Hall, 2007 - Technology & Engineering - 491 pages
For introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office.
A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media.
Results 1-3 of 39
TROJAN HORSES Is there anything else hackers can do if they break into my
computer? Hackers often use individuals' computers as a staging area to do
mischief. To perpetrate widespread computer attacks, for example, hackers need
A hacker launches a DDoS attack by sending instructions for conducting attacks (
red lines) to other computers, making them function as "zombies." These zombie
computers (which sometimes number in the thousands) then attack the target ...
For hackers to access your computer, they must know your IP address. With a
NAT-capable router/firewall installed on your network, hackers are unable to
access your internal IP address, so your computer is safe. When you first
attempted to ...
What people are saying - Write a review
Understanding the Parts
25 other sections not shown