viruses- nikolas dagostino

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 4. worm- is a backdoor Trojan horse that affects computers using
  2. 7. A computer worm is a standalone malware computer program
  3. 9. 10 mainframe computers running the TENEX operating system .
  4. 11. time in the Philippines when.
  5. 12. loaded onto a user's computer without the
  6. 13. A virus that comes within an attached file in an e-mail message.
  7. 15. access to it unless a ransom is paid.
  8. 17. set of instructions and associated documentation
  9. 19. BBN in 1971. Its original iteration was designed to move between DEC
  10. 21. Phishing is a common method of online identity theft and
  11. 23. client for Macintosh operating systems. When Leap first appeared,
  12. 24. referred to as Love Bug or Love Letter, was a
  13. 25. computer viruses are destructive though.
  14. 27. A computer virus is a malicious software
  15. 29. that has been compromised by a hacker, computer virus
  16. 31. not it is a trojan, virus or worm.
  17. 32. Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008.
  18. 33. true intent.
  19. 34. tasks of one sort or another under remote direction.
  20. 37. to publish the victim's data or perpetually
Down
  1. 1. operating systems, discovered on January 17, 2007.
  2. 2. or files, infecting them in the process.
  3. 3. Creeper was an experimental computer program written by Bob Thomas
  4. 5. In computing, a zombie is a computer connected to the
  5. 6. knowledge and performs malicious actions.
  6. 8. or it can mean all the software on a computer,
  7. 10. is any malicious computer program which misleads users of
  8. 14. Virus Chest is a safe place in Avast Antivirus for storing potentially harmful files and completely isolating them from the rest of your operating system. Files inside the Virus Chest cannot be accessed or run by any outside processes, software applications, or viruses.
  9. 15. credit card companies or other business like Amazon and eBay.
  10. 16. Windows personal computers on and after 5 May 2000
  11. 18. a type of malicious software from cryptovirology that
  12. 20. worm that attacked tens of millions
  13. 22. the first worm for Mac OS X. It propagates through iChat,
  14. 26. phishing with e-mail messages that spoof, or mimic,
  15. 27. spreading. See more computer pictures. ... Most people
  16. 28. the applications and the operating system.
  17. 30. was much debate between Mac users and malware experts as to whether
  18. 35. instant
  19. 36. can self-replicate, inserting itself onto other
  20. 38. replicates itself in order to spread to other computers.