Email
A client is a program such as Outlook Express, on a computer
connected to the internet, or an online client such as email services provided
by Hotmail or Yahoo. Email has now progressed to technology such as mobile
phones or even game stations, using GPRS, WAP or even SMS. Messages are sent
using an SMPT server (simple mail transfer protocol-port 25) and received using
a POP3 (post office protocol-port 110)or an IMAP (internet mail access
protocol-port 143) server.
There are however, disadvantages to email. Its simplicity means that is often misused, ranging from inappropriate messages, to viruses, worms and Trojans which can be attached very easily. Spam mail can block up mailboxes and whole areas of the internet itself.
Spoofing and spamming
It is easy for users to write a program that will give a fake address in the ‘From’ section of an email, which misleads the user into thinking it’s from a reliable source. It’s very popular from virus emails. Many individuals also find it funny to convince email users that they are different people, normally significant figures of the general public. This is known as spoofing. Spamming is using email to conduct a junk mail campaign, which is so easy to do it can lead to flooding email users inbox.
It is easy for users to write a program that will give a fake address in the ‘From’ section of an email, which misleads the user into thinking it’s from a reliable source. It’s very popular from virus emails. Many individuals also find it funny to convince email users that they are different people, normally significant figures of the general public. This is known as spoofing. Spamming is using email to conduct a junk mail campaign, which is so easy to do it can lead to flooding email users inbox.
Virus
A virus is a harmful piece of code that attaches itself to programs or files. Once opened the virus is capable of replicating itself.
A virus is a harmful piece of code that attaches itself to programs or files. Once opened the virus is capable of replicating itself.
Worm
This is a specific type of virus, when once installed, it is capable of replicating itself in great volumes without any further files being opened. Due to this virus being capable of ‘burrowing’ into a system without human assistance, some worms allow their ‘creator’ to take control of the computer systems remotely.
This is a specific type of virus, when once installed, it is capable of replicating itself in great volumes without any further files being opened. Due to this virus being capable of ‘burrowing’ into a system without human assistance, some worms allow their ‘creator’ to take control of the computer systems remotely.
Trojan
This is another virus in the form of a code, named after the Trojan horse. It is usually covered up by a attachment or download but may harbour an unwelcomed payload. Once installed on a user’s machine it can do damage to the users system and possibly take control of the user’s machine.
This is another virus in the form of a code, named after the Trojan horse. It is usually covered up by a attachment or download but may harbour an unwelcomed payload. Once installed on a user’s machine it can do damage to the users system and possibly take control of the user’s machine.
No comments:
Post a Comment