User:Amnaalisha/sandbox

--Amnaalisha (talk) 22:08, 15 June 2014 (UTC)

DoS and DDoS
Dos stands for “denial of service” which basically means someone trying to hack to your computer system using some kind of software Denial of service is an attack in which the certain recourse is attacked to block the access. There are many ways to do this but the most common and the most popular one was to spoof a ping which means that all the devices on a network attacking one computer device and the person would run out of time before he even tries to respond back this is an example of DDos which stands for Distributed denial of service where multitude systems are comprised and they are attacking one device.

Backdoor
Back door is a way for the hackers to get into your computer. The backdoor feature may be installed so the programmer could be able to access the program for troubleshooting or some other reasons. A worm could take the advantage of the backdoor to have an early attack on the computer.

Spoofing
Spoofing is when the hacker try’s to fool someone to get access to their personal details for example someone may send you a link to website which may ask for your details and password and in the end you are being fooled by the replica website. Phishing is part of spoofing as you are giving your details away by being fooled.

Mathematical attack
Mathematical attack is method in which the hacker may try to crack your password using software that could encode the password. It would go through all the keys to make up the password. The Best way to prevent from this is to set a harder password to crack e.g. Password would take seconds to be hacked but “Pa$$w0rd” would take longer time and would be hard to be cracked.

Brute Force
Brute force is a common way to hack the password. Brute force goes through the letters, numbers, upper cases and lower cases until it finds the password when you run the software that has the brute force features it will show you how long it will take until the password will be cracked and it gives figures that the password could be.

Adware
Basically, adware is any software application in which promotion banners are showed while the program is running. The writers of these applications include additional code that brings the ads, which can be seen through pop-up windows or through a bar that comes on a computer screen. The explanation for adware is that it assistances recover programming development cost and supports to hold down the cost for the user.

Trojans
Trojans are hateful platforms that perform activities that have not been official by the user. These actions can include: Removing all data, blocking the data, modifying data and also copying the data. Trojans also interrupt the performance of computers or computer networks.

Worm
An internet worm is a program that spreads through the internet by repeating itself on computers by their network connections. A lot of internet worms are now wicked. As well as using the computers they land on to spread themselves more, they're aimed to take control of them, either to take confidential user information or to transform them into remote-controlled 'zombies' or 'bots'.

Software Exploitation
Software exploitation means when someone has accessed into your software and is trying to replace the code taking advantage of the weakness and the bug or another problem so the hacker can misuse the software. Jail breaking an iPhone is an example of this as the hacker would be doing many things for free instead of paying for it.

Virus Rootkits
Virus rootkit is software used to hide the code written to attack your computer system. Malware is the most common that is normally hidden using virus rootkit. Its not really the most dangerous attack you can have you system has the antivirus software can easily find the code hidden.

Trojans
Trojans are one of the worst viruses you can have on your computer system as they can include the following: Removing all data, blocking the data, modifying data and also copying the data. Trojans also interrupt the performance of computers or computer networks.

Spyware
Spyware is a very big threat for a computer system it is a piece of software that hackers used to steal important data. It is very difficult to identify spyware using antivirus software. It is secretly sent to the computer to keep track of what you are doing the moment you enter your bank details the hacker may empty your money within minutes. Some organisation use spyware to keep track of what their user are up to.