Lets Get It
Information recorders
Keystroke loggers
Spy loggers
Keystroke spies
Macro
Stealth
Logic
Execution timing
A milli sec
A bat
A worm
Logical port blocking
Static addressing.
Packet switching.
Packet filtering.
Attaching a motion alarm.
Installing software that can signal your notebook's location.
Installing an external hard drive.
Locking your notebook to a work surface.
Encryption code
Virus signature
Compression code
Virus pattern
Change your password frequently.
Create a hard-to-guess password, with a combination of letters, numbers, and symbols.
keep your password written down and stored in any easy-to-remember location.
Keep your password a secret.
Entering through its Internet connection
overhearing your password and log-on information
Sitting down at a computer and installing hacking software
Entering through a company intranet
Antivirus software
Host program
Hard drive
Files on the computer
Scanning
Inoculation
Quarantining
Encryption
Personal
Biological
Identity
Biometric
modems
Routers
Switches
Network interface cards (NICs)
Old surge protectors can deliver power to your computer without protecting it.
Power surges can be blocked by using a computer surround.
Data line surges can be blocked by using a computer surround
It is best to unplug computers during an electrical storm.
Convert logical ports to physical port configurations
hide user IP addresses from the Internet
Dynamically assign IP addresses via an ISP
Translate IP addresses from the Internet
Prank
Joke
Legend
Hoax
A worm
A time bomb
A script virus
An e-mail virus
a Trojan horse
A virus
A worm
A zombie
Stealth
Multipartite
Polymorphic
Worm
Script virus
Macro virus
Polymorphic virus
Worm
Trojan horse
Packet sniffer
Backdoor program
DDoS
Engineering
Theft
Pretexting
Pharming
Firewall
Packet filter
A packet sniffer
Antivirus filter
Boot-sector virus
Time bomb
Logic bomb
Trojan horse