additional protection from threat to your computer, especially when using the Internet. Firewall - it helps in protecting your computer from unauthorized entries, viruses, or worms from the Internet or network. A selection box which says Don’t allow exceptions is available. When this box is checked, all incoming programs will be blocked. Automatic Updates - is another feature of Windows which when turned on will automatically download updates from Microsoft Windows website. Virus Protection - is usually about the current antivirus software installed in your computer; this option is recommended to be turned on always. Antivirus software is meant to locate, find, and remove virus threats that are already in your computer. EMAIL SPAM Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message set to multiply recipients. Dangerous spam carry virus like trojan horse and other malicious software (malware). Spammer is the term used to refer to a person who create electronic spam. BACK EMAIL SPOOFING This refers to deceitful email practice in which the sender address is change. So that it would appear to have come from a different sources usually someone you know. Usually, the reply to address is the source of the email, and when you unknowingly reply to it you would be BACK PHISHING This is deceitful practice of trying to get confidential information such as passwords and usernames, ad credit card details by making it appear as if it comes from trustworthy source. Phishing is usually done by email or other similar means using a popular entity such as Microsoft, Yahoo, BACK
Google, Amazon, and financial institutions to
PHARMING This is dangerous hacker attack on website which directs all traffic to the website to another fictitious website. The main object of pharming is to obtain username and password, as well as credit card and financial information, and use these to steal their money BACK SPYWARE This is a computer program that installed covertly on a person computer to collect information or event take control over the computer without the knowledge of the user. A spyware program would be able to monitor the collect information about BACK COMPUTER WORM This dangerous computer program that replicates itself through a network. BACK TROJAN HORSE This is from malware fronting to perform a good task , but covertly perform undesirable function with the intention of entering computer without the user’s consent.BACK COMPUTER VIRUS This s a program that duplicates itself and then infects the computer. The virus can also be transferred by using of removable storage media such as a BACK diskette, CF, flash drive, memory card, and others. HACKER This is a person who is able to enter and control other people’s computer without authorization. BACK