..:: YA ALLAH ::.. " AKU MOHON KEPADAMU AKAN KECINTAANMU, KECINTAAN ORANG YG MENCINTAIMU, DAN CINTA KEPADA AMAL YG MENDEKATKAN KEPADA KECINTAANMU

Untuk mencari data ke seluruh internet lakukan dibawah ini.

DONASI

Dukung blog ini dengan donasi anda. jika anda merasa blog ini bermanfaat, anda bisa memberikan kontribusi ke ICT WATCH BY= KING ALIBABA via BANK BRI SYARIAH A/N MOHD MUKTI SYAHALI NO.REK= 1004365662 ATAU WESTERN UNION ATAU KLIK IKLAN DIBAWAH INI ATAU IKUT JOIN&BERGABUNG DI http://www.kingalimasterkaya.tk KARENA ANDA AKAN DAPAT WEBSITE GRATIS&PULUHAN E-BOOK&SOFTWARE&HAK USAHA&KOMISI 100%,BUKAN MLM,YG TUJUANNYA DAPAT MEMBAWA BAROKAH ILMU&HARTA&TAHTA UNTUK ANDA

MAU MAEN GAME ONLINE GRATIS KLIK DIGAMBAR

TOKO ONLINE

..:: ICT WATCH KING ALI BABA ::.. " KASIH DAN SAYANG SECERAH CAHAYA,Andai hati sebening kaca, pastilah jiwa tiada ternoda.....andai sikap selembut sutra,santun kata tiada terluka.....,andai mulut berkata mulia, tiada hati yg terluka... namun tiada yg sempurna.... Minal Aidin Wal faizin. mohon maaf lahir & batin.... SELAMAT MENUNAIKAN IBADAH PUASA RAMADHAN & SELAMAT HARI RAYA IDUL FITRI SEMOGA KEMBALI KE FITRAH,AMIN!

OFFICIAL PARTNER TIKET.COM

Thursday, January 14, 2010

Trojan Horse….Greek Myth or Computer Nemesis?

Trojan Horse….Greek Myth or Computer Nemesis?

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses but instead introduces viruses into your computer.

The Trojan can be tricky. Who hasn’t been online and had an advertisement pop up claiming to be able to rid your computer of some nasty virus? Or, even more frightening, you receive an email that claims to be alerting you to a new virus that can threaten your computer. The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their “free”, attached software into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable. You proceed to take them up on their offer and download the software. In doing so, you have just potentially exposed yourself to a massive headache and your computer to a laundry list of ailments.

When a Trojan is activated, numerous things can happen. Some Trojans are more annoying than malicious. Some of the less annoying Trojans may choose to change your desktop settings or add silly desktop icons. The more serious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware such as viruses, spy on the user of a computer and secretly report data like browsing habits to other people, log keystrokes to steal information such as passwords and credit card numbers, phish for bank account details (which can be used for criminal activities), and even install a backdoor into your computer system so that they can come and go as they please.

To increase your odds of not encountering a Trojan, follow these guidelines.

1. Remain diligent
Trojans can infect your computer through rogue websites, instant messaging, and emails with attachments. Do not download anything into your computer unless you are 100 percent sure of its sender or source.
2. Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.
3. Install reliable anti-virus software. It is also important that you download any updates frequently to catch all new Trojan Horses, viruses, and worms. Be sure that the anti-virus program that you choose can also scan e-mails and files downloaded through the internet.
4. Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer.

Nothing can guarantee the security of your computer 100 percent. However, you can continue to improve your computer's security and decrease the possibility of infection by consistently following these guidelines.

Blogroll

Adeshendra | Adieska | Alex | Andaka | Andrisaick19 | Angga | Arema | Arhan | Ariwolu | Artha | Audy | Badoer | Blog.Zalukhu.biz | Blogger Sumut | Blogguebo | Bocah Iseng | Chodirin | Cosaaranda | Curhat Bebas | DanielGM | Danu | Dhinata | Dobelden | Ekonurhuda | Enggar | Fajarqimi | Fenny | Ferry | Firanza | Gloria | Gnupi | Hakimtea | Harianus Zebua | Heddy | HendraDP | Iam | Ick | Ika Koolsonic | Iklan Baris Gratis | Indo Trans | Ipanks | Izandi | Janey | Jimmysun | Kipas | Lspart | Malapu | Manggis | Manggoaddict | Manik | Marlop | Mascayo | Masenchipz | Mujizas | MyMoen | Nich | Novee | Nugraha | Nurfajri | Nuqiah | O-om | Okta Sihotang | Otak Kabel | Putra Eka | Pencuri Kode | Persikers | Realy Life | Rebecka | Rhasputin | Ridho | Ronggo | Rubenmanik | Rudyahud | Starwrite | Sumintar | Supermance | Tetetzet | The Gands | Tipis | Tony Jauhari | Windra | Yopan | Yudiworld | Zalukhu.Biz | Zona Merah | A-Ri | Budi Herprasetyo | Imoe | RudyTarigan | Blogywalkie | Ilhamcool | Ana SMS | Nurwita | Kang Nawar | Ndeso | Sudarma | Wibi | Detailzsoft | Alibaba | Manan Tarigan | Thom | Septian | -sLiKeRs- | Qisthon | ugiQ | Hangga Nuarta | Anak Nias | BlognyaOpa | IndoContest | Alam Pintar | AngIn | Sahabat Bumi | Deta Desvi | Kopitozie | Famdy | Indungg | Atokaja | Narmadi | Rozy | Fuadidaud | Kodil | M4s73r | NickoHadi | kibayusejati | FajarSeraya

Bagi yang ingin tukaran link di blogroll silahkan bilang aja yah... tapi maaf blogrollnya nofollow dan nama yang dicantumin adalah nama pemilik blog bukan frase berbau iklan (kecuali yang berbayar MATRE MODE ON hehehe)

Copyright Februari 2007 © ALIBABA Powered by BLOGSPOT
Theme: GREEN Ver. 2 by Cara bikin,Game hp,Download Thema Komputer,Seo Blog,Tutorial,penghasilan blog,Transformers,tema,hp,komputer,mp3,game java inspired by AL-QURAN,HADIST,JIBRIL,ALIBABA NETWORK,PESANTREN DIGITAL RAJAWALI TAUHID
Sponsored by BLOGSPOT