Recent Changes

Tuesday, October 27

  1. page Video edited This This is a
    ThisThis is a
    (view changes)
    3:06 pm

Monday, October 26

  1. page Viruses edited ... True viruses infect computers by coping themselves. They spread through USB drives, floppy dis…
    ...
    True viruses infect computers by coping themselves. They spread through USB drives, floppy disks, and any other form of exicutable coad.
    Trojan horses appear harmless when you download them, but in time they are accesed by a hacker and unleash a volley of terror. Some of the tasks trojans perform are data theft, keystroke logging, and downloading othet viruses.
    ...
    they appear. {computer-virus1.JPG}
    (view changes)
    6:41 am
  2. 6:40 am
  3. page Anti-Virus edited Malware, computer viruses, worms, and Trojan horses can be prevented by good antivirus software. Th…
    Malware, computer viruses, worms, and Trojan horses can be prevented by good antivirus software. The basic jobs of an antivirus software is to prevent, detect, and remove all forms of malware. Antivirus software detects malware by searching for malicious patterns in executable code.
    {kaspersky-logo.jpg} We recomend the Kaspersky 2010 antivirus system.§Kaspersky detects software vulnerabilities, provides real-time security without slowing your computer down, virtual keyboard keeps keystrokes private, and helps prevent you from clicking on malicious sites.
    (view changes)
    6:37 am
  4. page Anti-Virus edited ... in executable code.\ code. {kaspersky-logo.jpg}
    ...
    in executable code.\code.
    {kaspersky-logo.jpg}
    (view changes)
    6:24 am
  5. page Anti-Virus edited Malware, computer viruses, worms, and Trojan horses can be prevented by good antivirus software. T…
    Malware, computer viruses, worms, and Trojan horses can be prevented by good antivirus software. The basic jobs of an antivirus software is to prevent, detect, and remove all forms of malware. Antivirus software detects malware by searching for malicious patterns in executable code.\
    {kaspersky-logo.jpg}

    (view changes)
    6:22 am
  6. 6:22 am
  7. page home edited ... On October 6, 2009 several terabytes of information regaurding millitary development was stole…
    ...
    On October 6, 2009 several terabytes of information regaurding millitary development was stolen by hackers. Cyber security is a big issue. As our world grows in its dependents on the internet, so dose the thret of cyber attack. Even President Obama acnologes the growing need of better cyber security.
    Check out some of the other pages to see more about cyber security.
    {cmimg_2186.jpg}
    (view changes)
    6:11 am
  8. file cmimg_2186.jpg uploaded
    6:09 am
  9. file cmimg_2186.jpg uploaded
    6:09 am

More