Today's Computing Tip
Courtesy of SmartComputing.com
to their spectacuraly informative email HERE....
What's A Zombie?You are invited to read the entire SmartComputing.com article and other informative articles TEXT
Zombie-making Trojans infect systems most often when users open infected email attachments or documents. Examples include the SubSeven Trojan, Tribal Flood Net, Trin00, and Mstream. Firewalls, antivirus, and filtering programs go a long way toward minimizing the risk of becoming a zombie, but some people persist in opening unscanned files. Likewise, some administrators fail to take proper precautions to safeguard their networks. Installing security patches to applications and operating systems is paramount for effective network security against zombie infiltration. It can be difficult to tell if a system is a zombie-in-waiting because most infections don’t make themselves readily apparent. The bug lies dormant until the hacker issues a command to wake up his undead digital army and have them start their attack simultaneously. The only good news about zombie infections is that, unlike traditional viruses, they don’t destroy data on the host or target systems. A zombie’s sole purpose is to create network congestion.
to their spectacuraly informative email HERE....
0 Comments:
Post a Comment
<< Home