Most Common Types of Viruses and Other Malicious Programs

You might aware form this and be away from this: ;)

 

The Great Inventors in Computer Field

Here are the lists:

 

Network Devices Explained

HUB, BRIDGE, SWITCH, ROUTER


What is Pixel?

Definition of pixel: Picture element.




Computer languages - Basic

Computer language or programming language is a code used by computer programmers to communicate with computers. Computer language software establishes a flow of communication between software programs. Computer language helps a computer user identify the command necessary to process computer data. These languages ​​can be classified into the following categories:

1. Machine language
2. Assembly language
3. High level language




How to rotate screen using keyboard shortcuts

There are four shortcuts to rotate screen in windows.

 


How to hack Clash of Clans

Want to hack clash of clans?? want unlimited gems and gold. Then here you are. So now I am going to write about is it possible to hack clash of clans or you are being fooled in that tricks.


Password cracking - Dictionary Attacks

Dictionary Attacks are a method of using a program to try a list of words on the interface or program that is protecting the area that you want to gain access to.


Attention!!! Subtitles can be harmful for your Computer

Watching a film with subtitles this weekend? It might contain a surprise hacking that attack your Computer TV or mobile, security firm Check Point’s researcher warned. 


 
All might be unaware that a little subtitle file could hand over full control of your computer to hackers, while you enjoy the movie.

Wireless Hacking - Packet Sniffing

I will be using the program Wireshark do demonstrate packet sniffing. Packet sniffing is the act of capturing packets going through a network. With a packet sniffer, once a hacker gains access to wireless network he could intercept private information going through a network such as: usernames, passwords, IM conversations, and e-mails.

 


Wireless Hacking - Scanning for Wireless Network


The hacker starts by scanning for wireless networks near him. The Windows tool we will use in this section is called NetStumbler. Also by the time you receive this eBook MacStumbler may already be released for those of you using a Mac.
Some other similar programs are:
  • Kismet for Windows and Linux.
  • KisMac for the Mac.

What is Malware?

1. Viruses

 

Viruses cannot spread without the help of us humans. They are like parasites because they need a host to attach themselves to. The host is usually a legitimate looking program or file. Once this program is launched, the virus is executed and infects other files on your computer. Viruses can be very destructive. They can do damage to your computer hardware, software and files. Viruses are spread through the sharing of files and are many times sent within emails via attachments.


Remove aMuleC virus

What is aMuleC Virus

 

aMuleC is a potentially unwanted application (PUP) that poses as a tool to archive files but in reality is adware. Both Windows and Mac users can be effected by aMuleC. Most users who have encountered aMuleC don’t recall downloading it, which means that aMuleC can get on your computer without you knowing it. aMuleC malware can achieve that by attaching itself to software distributed on the Internet.