Question 1
People nowadays prefer to use open software because of the
availability of the source code and the right to modify them. People can use
the source code and modify it into something they prefer to. They also have the
right to redistributae and improves the source code, they can easily share it
with their friends and even change the code if there are something they don’t
like about.
5 Popular Open Source Software:
- Firefox vs Internet Explorer
- Thunderbird vs Microsoft Outlook
- Abiword vs Microsoft Word
- OpenOffice vs Microsoft Excel and Microsoft Powerpoint
- VLC Media Player vs Windows Media Player, Quick Player and Real Player.
Question 2
No.
|
Types of threats and malicious
program
|
The effect on device
|
How to repaired or remove
|
1
|
Ransomware
trojans (e.g. Pgcoder, FBI Virus)
|
Encrypt data
files on the infected system, then demand money from the victims in exchange
for the decryption key. This type of malware adds insult to injury - not only
has the victim lost access to their own important files, they've also become
victim to extortion.
|
To detect and remove
ransomware and other malicious software that might be installed on your
computer, run a full-system scan with an appropriate, up-to-date, security
solution. The following Microsoft products can detect and remove this threat:
|
2
|
Keylogger
trojan
|
Surreptitious software that monitors your
keystrokes, logging them to a file and sending them off to remote attackers.
Some keyloggers are sold as commercial software - the type a parent might use
to record their children's online activities or a suspicious spouse might
install to keep tabs on their partner. Keyloggers may record all keystrokes,
or they may be sophisticated enough to monitor for specific activity - like
opening a web browser pointing to your online banking site. When the desired
behavior is observed, the keylogger goes into record mode, capturing your
login username and password.
|
The best way
to remove keyloggers is to make use of software that work in many ways to get
rid of this hidden virus. It is quite easy to run software to remove keylogger.
In order to make the most out of the software, it is imperative to run it at
least once in a week. This is a must to keep a Trojan, like keylogger, at bay
and to protect your data and necessary information from hackers. However,
prior downloading any removal software makes sure you are shopping it from a
reputed and authorized site. Else others can refill it with unwanted viruses,
instead of cleaning it.
|
3
|
Storm worm
|
gives attackers full access to the
system (hence the term 'root') and typically hides the files, folders,
registry edits, and other components it uses. In addition to hiding itself, a
rootkit typically hides other malicious files that it may be bundled with.
|
Most antivirus
programs that have been updated with the latest worm definitions will detect
and remove the worm. You can also use an online worm scanner if you don’t
have one installed. This type of program is available from companies such as
Trend Micro and Symantec. A free anti-malware program, such as Malwarebytes
or Spybot Search & Destroy, will also do the trick. Another program that
can defeat the Storm worm might already be installed on your computer: The
Microsoft Malicious Software Removal Tool (MSRT) is a free program you can
use to remove the Storm worm from your system.
|
4
|
Android plankton origin 2
|
Hide itself in apps that addressed
themselves as supplementary programs to Angry Birds, but when in the device
would steal user browser data and could access a remote server to add even
more malicious files to the device.
|
You would need to
remove the entire application, and check for the viruses in the entire file
directory of yours. If there is something fishy that you still find, the only
way you can proceed is re-installation of the operating system. The two
things you need to do is delete the application along with the app data and
memory of the app.
|
Posted by Unknown
Powered by Blogger.