WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages

TYPES OF VIRUSES AND PART WHICH THEY INFECT

There are many viruses which affect your device and these viruses are not easy to detect if you don’t have an antivirus installed in your device. Different viruses affect your device in different ways. Let’s look at the destination where these viruses stay and which part they affect the most.

Virus infects device

Here are few viruses:

Ø Executable File Infectors: these viruses reside in the memory of the computer and infect executable files with extensions, so that it continues to infect other executables. They can remain in memory for a long time after being activated. These viruses are believed to be overwrite viruses, as they corrupt the file where it is located.

Ø Direct Infectors: the infected program must be running for the virus to function, that is, to continue infecting and carry out its destructive actions.

Ø Memory Resident Infectors: the infected program does not need to be running, the virus lodges in memory and remains resident infecting each new program executed and executing its destructive routine.

Ø Boot Sector Infectors: the boot sector is that contains the specific information regarding the disk format and the data stored on it. This boot sector contains a program called Boot Program, which is in charge of executing the disk and searching and activating the operating system files on the disk. If this program cannot find the files, it is because it is affected by boot sector viruses. In this way, every boot disk, and failing that, the entire computer is infected; however, in some cases, it is necessary to replace the infected sector with an original boot sector due to the infection. The virus becomes activated when you turn on your device.

Ø Macro viruses: they are the most popular viruses today. They are not transmitted in executable files, but through the documents of the applications that have some type of macro language. They are application specific and cannot infect other executable files, such as Microsoft Word, Microsoft Excel, Microsoft Power Point, and Microsoft Access. When some of these files are opened or closed, the virus takes control and copies itself to the base template of new documents so that the rest of the files that are opened or created in the future are infected.

Ø From Actives Agents and Java Applets: these are small programs that are recorded on the user's hard drive when it is connected to the Internet and are executed when the Web page on which it is browsing requires it, being a way of executing routines without having to consume the width of the band. These viruses access the hard drive through a WWW connection so that the user does not detect them. They can be programs to delete, corrupt files, control memory and send information to a certain Syrian Web.

Ø From HTML: it is a more efficient infection mechanism than the previous one. By including code in HTML files and simply connecting to the Internet, any file that contains this format can become infected and run the virus. This type of virus is developed in Visual Basic Script, attacking users of Windows 98, 2000, and the latest versions of Explorer. It can delete or corrupt files.

Ø Trojan / Works: these are programs that imitate useful programs or execute some kind of apparently harmless action, but that in a hidden way executes the harmful code from the user. They are designed in such a way that the content is disseminated by the user himself and not for reproduction. They can also be programmed so that once it reaches its objective it destroys everything.

So, to keep your device safe from all these viruses and keep your device in healthy and working position you should be using an antivirus which fights with all the viruses and is capable of giving you complete security focusing on all the parts of your device.

Comments

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

BOOT SECTOR VIRUS