viruses- nikolas dagostino
Across
- 4. worm- is a backdoor Trojan horse that affects computers using
- 7. A computer worm is a standalone malware computer program
- 9. 10 mainframe computers running the TENEX operating system .
- 11. time in the Philippines when.
- 12. loaded onto a user's computer without the
- 13. A virus that comes within an attached file in an e-mail message.
- 15. access to it unless a ransom is paid.
- 17. set of instructions and associated documentation
- 19. BBN in 1971. Its original iteration was designed to move between DEC
- 21. Phishing is a common method of online identity theft and
- 23. client for Macintosh operating systems. When Leap first appeared,
- 24. referred to as Love Bug or Love Letter, was a
- 25. computer viruses are destructive though.
- 27. A computer virus is a malicious software
- 29. that has been compromised by a hacker, computer virus
- 31. not it is a trojan, virus or worm.
- 32. Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008.
- 33. true intent.
- 34. tasks of one sort or another under remote direction.
- 37. to publish the victim's data or perpetually
Down
- 1. operating systems, discovered on January 17, 2007.
- 2. or files, infecting them in the process.
- 3. Creeper was an experimental computer program written by Bob Thomas
- 5. In computing, a zombie is a computer connected to the
- 6. knowledge and performs malicious actions.
- 8. or it can mean all the software on a computer,
- 10. is any malicious computer program which misleads users of
- 14. Virus Chest is a safe place in Avast Antivirus for storing potentially harmful files and completely isolating them from the rest of your operating system. Files inside the Virus Chest cannot be accessed or run by any outside processes, software applications, or viruses.
- 15. credit card companies or other business like Amazon and eBay.
- 16. Windows personal computers on and after 5 May 2000
- 18. a type of malicious software from cryptovirology that
- 20. worm that attacked tens of millions
- 22. the first worm for Mac OS X. It propagates through iChat,
- 26. phishing with e-mail messages that spoof, or mimic,
- 27. spreading. See more computer pictures. ... Most people
- 28. the applications and the operating system.
- 30. was much debate between Mac users and malware experts as to whether
- 35. instant
- 36. can self-replicate, inserting itself onto other
- 38. replicates itself in order to spread to other computers.