Changes between Version 3 and Version 4 of MalWare


Ignore:
Timestamp:
2020-02-13T18:25:27+01:00 (7 days ago)
Author:
spirillen
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • MalWare

    v3 v4  
    55Programs officially supplied by companies can be considered malware if they secretly act against the interests of the computer user. For example, Sony sold the Sony rootkit, which contained a Trojan horse embedded into CDs that silently installed and concealed itself on purchasers' computers with the intention of preventing illicit copying. It also reported on users' ''listening habits'' (TrackWare), and unintentionally created vulnerabilities that were then exploited by unrelated malware.
    66
    7 One strategy for protecting against malware is to prevent the malware software from gaining access to the target computer. For this reason, antivirus software, DnsFirewalls, FireWalls and other strategies are used to help protect against the introduction of malware, in addition to checking for the presence of malware and malicious activity and recovering from attacks
     7One strategy for protecting against malware is to prevent the malware software from gaining access to the target computer. For this reason, antivirus software, [[wiki:DnsFirewall|DnsFirewalls]], [[wikipedia:Firewall_(computing)|FireWalls]] and other strategies are used to help protect against the introduction of malware, in addition to checking for the presence of malware and malicious activity and recovering from attacks
    88
    99