Virus & Spyware
What does DROWN stand for? How does it harm the computer and the user? What are the ways to protect the device from this attack?
- 427 views
- 2 answers
- 1 votes
What are the methods to protect your computer from a virus or any other type of attack? Are these methods same as those applied for protection from a Trojan Horse?
- 410 views
- 2 answers
- 1 votes
The DOS and DDOS attacks are the same attacks with two aliases or are they two different types of attacks? If yes, then how are they different from each other?
- 754 views
- 2 answers
- 0 votes
What are the different types of DOS attacks? Are they the same? In what way do they differ from each other?
- 715 views
- 2 answers
- 0 votes
Why do DOS or DDOS attacks take place? What is the motive of the individuals who make it happen? What do they gain by performing this attack?
- 734 views
- 2 answers
- 1 votes
How do you prevent a Trojan Horse attack on a computer or any similar device? Are these methods always functional? Or do they fail sometimes?
- 661 views
- 2 answers
- 1 votes
How badly does a Trojan Horse effect the device which it enters? Does the extent of the attack remain same on all computers or does it vary from PC to PC?
- 840 views
- 2 answers
- 1 votes
How does the Trojan Horse attack a processor or a computer in general?How does it enter the computer or any other device? Does it spread or no?
- 373 views
- 2 answers
- 2 votes
What do you mean by a computer virus, a worm, and a Trojan horse? What is the difference between each one of them?
- 468 views
- 2 answers
- 1 votes
What do you mean by the term malware and what does adware mean? What is the difference between these two?
- 384 views
- 2 answers
- 2 votes








