Photobucket - Video and Image Hosting

 
Check to have links open new windows
 

Sunday, August 20, 2006

Today's Computing Tip

Courtesy of SmartComputing.com
What's A Zombie?

Zombie-making Trojans infect systems most often when users open infected email attachments or documents. Examples include the SubSeven Trojan, Tribal Flood Net, Trin00, and Mstream. Firewalls, antivirus, and filtering programs go a long way toward minimizing the risk of becoming a zombie, but some people persist in opening unscanned files. Likewise, some administrators fail to take proper precautions to safeguard their networks. Installing security patches to applications and operating systems is paramount for effective network security against zombie infiltration. It can be difficult to tell if a system is a zombie-in-waiting because most infections don’t make themselves readily apparent. The bug lies dormant until the hacker issues a command to wake up his undead digital army and have them start their attack simultaneously. The only good news about zombie infections is that, unlike traditional viruses, they don’t destroy data on the host or target systems. A zombie’s sole purpose is to create network congestion.
You are invited to read the entire SmartComputing.com article and other informative articles TEXT
to their spectacuraly informative email HERE....

0 Comments:

Post a Comment

<< Home