Posts

Showing posts with the label computer worm

WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages

COMPUTER WORM AND ITS TYPE

Image
When someone mentions worms, they probably think of squirming creatures that children play with and adults use as bait for fishing. Like it or not, worms are totally harmless, unless they are computer worms. They may not harm you as virus do but they are dangerous too. Summary: A computer worm is a piece of software that copies itself from one computer to another. Unlike the virus, it is a standalone program that does not need a host. It does not normally attack files on a single computer. Instead, it spans entire networks and tries to create large botnets. Read on to learn more about computer worms. The definition: What is a computer worm? A computer worm is a malicious component that reproduces itself from one computer to another, in order to take over the entire computer network. Most worms are there for weakening of the computer system. They also take all your useful and important information. If the worm is malicious and is not only used to breach system security, the c

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

BOOT SECTOR VIRUS