Adrian

What is a Logic Bomb? Detection and protection

Logic bomb protection: A Logic Bomb is an event-based malicious code used by hackers to infect worldwide PCs. In this,…

4 years ago

Virus detection and prevention: What is a File-Infecting Virus?

Virus detection and prevention: a File Infecting virus is designed to infect the files stored on your computer system and…

4 years ago

What is the Boot Sector Virus? Protection and Preventive Measures

A Boot sector virus infects the hard disk or the Master Boot Record of your computer system and executes itself…

4 years ago

What is the Polymorphic Virus and How to Prevent it?

A polymorphic virus is a highly flexible and deadly virus that repeatedly changes and replicates itself to avoid detection. It…

4 years ago

Active and Passive Attacks: Differences and prevention

While Active and Passive attacks both belong to the family of security attacks there are few underlying points that differentiate…

4 years ago

What is a Replay Attack? Protection and Preventive Measures

A Replay Attack is categorized as a network-based security hack and it is built on interception and re-transmission of data.…

4 years ago

What is a TCP SYN Flood Attack? Prevention and Protective Measures

A TCP SYN Flood attack is categorized as DoS (Denial of Service attack). It is undeniably one of the oldest…

4 years ago

What is a Macro Virus? Protection and Preventive Measures

A Macro virus is a harmful PC threat that attaches its code to the pre-installed macro operation of a computer…

4 years ago

What is a Dictionary Attack and How to Prevent it?

In a Dictionary attack, cyber-criminals use password guessing techniques to bypass the security walls of a password-protected device. In this,…

4 years ago

What is a Teardrop Attack? Protection and Preventive Measures

The Teardrop Attack belongs to the family of DoS (Denial of service) attacks and aims at causing a system crash…

4 years ago