|
Viruses |
As malicious
programs that are buried within an existing program, viruses
replicate themselves and spread from machine to machine. Viruses
are a top malware headache, generating everything from
relatively harmless prank messages to commands that destroy
valuable programs and data. A virus may activate immediately or
lay dormant for a year or more before attacking its host system.
Contact Us
01293
537827
Back
to the top |
Worms |
Worms and viruses
are similar in that they both self replicate. But a worm is
designed specifically to spread extremely rapidly and
surreptitiously. It can hurt a system by rapid reproduction,
sucking up storage and memory resources or network bandwidth. It
may also deposit a Trojan horse.
Contact Us
01293
537827
Back
to the top |
Trojan horses |
Like a virus, a
Trojan horse is a destructive program that presents itself as a
harmless application. Unlike viruses, however, Trojan horses
don't replicate themselves. On the other hand, they do perform
one or more destructive tasks once activated, such as stealing
identity or financial data. A Trojan horse may also be designed
to make its host more vulnerable to future attacks or simply
activate to destroy hard-drive applications or data. Typically,
Trojan horses gain access to systems by masquerading as a useful
program or item.
Contact Us
01293
537827
Back
to the top |
Rootkits |
A rootkit is a
specialized and particularly dangerous from of malware. Rootkits
essentially subvert the core operating system and its loading
mechanisms, inserting their own code into the basic core
software operating the system. This makes them extremely
difficult to detect and eradicate.
Contact Us
01293
537827
Back
to the top |
Backdoors or Trapdoors |
A hidden bypass to a
program's security area, a backdoor or trapdoor may be created
by a programmer to expedite troubleshooting or for some other
innocuous purpose. But once discovered, the technique may be
used by an attacker to damage, destroy or steal data. A program
with a known backdoor or trapdoor may itself be considered
malware.
Contact Us
01293
537827
Back
to the top |
Spam |
Unwanted email,
besides being a nuisance, is often used by attackers as a tool
for leading unsuspecting recipients to Web sites where viruses,
worms, spyware and other types of malware can be installed on
their systems.
Contact Us
01293
537827
Back
to the top |
Spyware |
Spyware is software
surreptitiously installed on a computer to send information
about a user's Web-surfing habits to an external location. Some
spyware is relatively innocuous, designed to generate data about
shopping, viewing or other habits without revealing the
identities of individual users. Malicious spyware, however, may
be used to hijack Web browsers in order to change their home
pages, receive waves of pop-up ads or ignore user navigation
commands.
Contact Us
01293
537827
Back
to the top |
Botnets |
Armies of "zombie"
computers infected by a Trojan horse and commanded by an
attacker, botnets can be used to launch spam email campaigns,
viruses or DDoS (distributed denial of service) attacks on Web
sites for either amusement or extortion purposes. Typically,
these botnets are built up secretly over several months before
being activated.
Contact Us
01293
537827
Back
to the top |
Since malware consists of multiple threats,
many methods and technologies are employed to safeguard systems.
Firewalls, for example, are used to filter out potentially
destructive data. Spam filters, spyware blockers, IDSes
(Intrusion Detection Systems) and IPSes (Intrusion Prevention
Systems) are other popular tools are used to fortify networks
and their computers against potentially destructive data.
Anti-virus programs, one of the most powerful anti-malware
defences, are designed to protect computers from the threats
posed by many common types of malware, including viruses, worms
and Trojan horses. Over the past several years, anti-virus
software publishers have gradually enhanced their products to
provide protection against a growing number of malware threats,
such as spam and spyware.
The malware threat has multiplied over the course of many years,
and it's highly unlikely that the problem will vanish soon, if
ever. It's therefore important for businesses to carefully
create an IT defence system that includes tools covering the
full spectrum of malware threats.
Contact Us
01293
537827
Back
to the top |
|
CALL OUT
|
£17.50 |
LABOUR |
£37.50 |
PER
HALF HOUR ALL PRICES EXCLUDE VAT |
Please call me to discuss my IT Support
requirements?
Manufacturers whose computer
equipment we can repair,
service / support.
ACER
FUJITSU SIEMENS
HEWLETT PACKARD
LENOVO
MICROSOFT
SAMSUNG
The towns in which
Digital
Office Solutions
Unit 5 Hyders Farm
Bonnetts Lane
Crawley
RH11 0NY
01293 537827
will service / repair
networks & PC's
ARUNDEL
BILLINGSHURST
BURGESS HILL
CATERHAM
CRAWLEY
CHARLWOOD
COPTHORNE
COWFOLD
CRANLEIGH
DORKING
EAST GRINSTEAD
EDENBRIDGE
EWELL
EPSOM
FOREST ROW
GODSTONE
HAYWARDS HEATH
HORLEY
HORSHAM
LEATHERHEAD
LINGFIELD
OXTED
PARTRIDGE GREEN
REDHILL
REIGATE
SALFORDS
SOUTHWATER
WESTERHAM
Faulty hard drive repaired,
virus removal, category 5 socket, patch
panel, no internet, DHCP, DNS Server, slow
data transfer, 10/100, gigabit, redundant
power supplies, active directory, UPS,
uninterruptible power supply, data loss,
monitors, poor resolution, local area
network, wireless local area network, ADSL,
SDSL, Windows XP, Windows Vista, Domain name
servers, dynamic host computer protocol,
gateway, Ethernet, storage, cd ROMs, DVD,
DVD rw, sage, instant accounting, line 50,
MYOB, software support, software
installation, programs loaded, computer
support, virus threats, spy ware, anti spam
filters, pop3 server, smtp, simple mail
transfer protocol, outlook, outlook express,
migration, mail boxes, server, trojan horse,
house keeping, defrag, defragment, check
disk, command prompt, ping, ip address,
192.168.1.1, default gateway, back up
verification, veritas, ms dos, bespoke
program, accounts, office suite, software,
hardware, power supply, atx, psu, dead,
faulty, repairs, repaired, fix, fixed,
support, contract, agreement, no fix no fee,
printer, won't print, pcl 5, pcl 6,
postscript, scan, scanner, document
archiving, twain, tif. jpg. gif. structured
cabling, cat 5, category 5e, category 6,
twisted pair, line loss, belkin, gigabit,
cnet, netgear, hub, switch duplex, half
duplex, full duplex, router, infrastructure,
rack data cabinet, 1u, 19u, balon, master
mod tap, rj45, rj11, data socket, patch
lead, plug, client, administrator, user,
password, forgotten password, motherboard,
network card, modem, graphics card, case,
micro, mini, tower, keyboard, mouse, usb,
usb2, firewire, office suite, media, mp3, ip
telephony, voip, cti, computer telephony
integration, database, speaker, active x,
direct x, problem, problems, twisted pair,
coa
|
|
|
|