Ads
related to: cara mengatasi virus brontok pada komputer 10 computer- Internet Security Suites
Compare Top Antivirus Security
Suites Offered by Leading Companies
- Windows 10 Top Antivirus
Get Your Windows Best Dedicated AV
Don't Compromise Your Personal Data
- McAfee Antivirus Review
Best Full Featured Protection
Home and Business Solutions
- Antivirus Software Review
All Up to Date, Non-Biased Reviews
Based on Actual Experiences
- Internet Security Suites
Search results
Results From The WOW.Com Content Network
Brontok originated in Indonesia. It was first discovered in 2005. The name refers to elang brontok, a bird species native to South & Southeast Asia. It arrives as an attachment of e-mail named kangen.exe (kangen itself means "to miss someone/thing"). The virus/email itself contains a message in Indonesian (and some English).
March 26: The Melissa worm was released, targeting Microsoft Word and Outlook -based systems, and creating considerable network traffic. June 6: The ExploreZip worm, which destroys Microsoft Office documents, was first detected. September: the CTX virus is isolated.
Leap - Mac OS X Trojan horse. Shamoon a wiper virus with stolen digital certificates destroyed over 35,000 computers owned by Saudi Aramco. Storm Worm - A Windows trojan horse that forms the Storm botnet. Stuxnet First destructive ICS -targeting Trojan which destroyed part of Iran 's nuclear program.
A computer virus [1] is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. [2] [3] If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
Computer hacking. In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. [1]
Spread of Conficker worm. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. [1] It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
Ads
related to: cara mengatasi virus brontok pada komputer 10 computer