{"id":129646,"date":"2009-11-11T02:28:00","date_gmt":"2009-11-11T07:28:00","guid":{"rendered":"tag:blogger.com,1999:blog-1027942875318741818.post-3636100883354235874"},"modified":"2009-11-11T02:55:35","modified_gmt":"2009-11-11T07:55:35","slug":"viruses-and-other-wildlife","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/129646","title":{"rendered":"Viruses And Other Wildlife"},"content":{"rendered":"<p><strong>MALICIOUS CODE<\/strong><\/p>\n<p><strong>Viruses<\/strong><br \/>&#8211; A program that has the ability to &#8216;break away&#8217; and to&#8217;copy &#8216;into the program \/ other systems <br \/>&#8211; Depending on other programs. <br \/>&#8211; Be active when &#8216;something&#8217; that contains a virus run. <br \/>&#8211; Usually within one operating system, although there are different operating    systems <br \/>&#8211; Infect: Memory and storage <\/p>\n<p><strong>Worms<\/strong><br \/>&#8211; Does not depend to a program. <br \/>&#8211; Reproduce themselves by themselves mencopy from 1 computer to another computer. <br \/>&#8211; Using the network \/ Network. <br \/>&#8211; Did not attack the program. <br \/>&#8211; Does not change the program. <br \/>&#8211; Not corrupt the data. <br \/>&#8211; But dangerous. <br \/>&#8211; Utilize network resources.<\/p>\n<p><strong>Trojan Horse<\/strong><br \/>&#8211; A fragment program that hide in the program and has a special function <br \/>&#8211; Often hidden in programs that attract users <br \/>&#8211; For example an interesting program, a new game. <br \/>&#8211; Usually used to tap one&#8217;s password. <br \/>&#8211; Trojan horse programs clever: <br \/>  Not leave a trace presence <br \/>  Can not be detected <br \/>  Programmed to destroy himself before it was detected<\/p>\n<p><strong>Bombs<\/strong><br \/>&#8211; Like the Trojan Horse <br \/>&#8211; Often combined with viruses, worms and programs that attack the system. <br \/>&#8211; Works by date, time or under certain conditions <br \/>&#8211; There are 2 kinds of bombs: time and logic <br \/>&#8211; Who work on a particular time is called time bomb (a bomb) <br \/>&#8211; Who worked on the incident \/ circumstances called logic bomb (logic bomb)<\/p>\n<p><strong>Back Doors<\/strong><br \/>&#8211; A technique used by the programmer to enter into a system. <br \/>&#8211; Is a secret way to enter into a system. <br \/>&#8211; Its function is to provide to the programmer to enter into a system through the &#8216;back door&#8217;. <br \/>&#8211; Sometimes programmers let trap door in the program to monitor pengetasan a program or operation.<\/p>\n<p><strong>OTHER WILDLIFE<\/strong><br \/><strong>Bacteria <\/strong><br \/>A program that does nothing but reproduce themselves <br \/>Usually beralokasi in memory, disk or other storage media. <\/p>\n<p><strong>Rabbits <\/strong><br \/>Another name of the program that produced very quickly. <\/p>\n<p><strong>Crabs <\/strong><br \/>Programs that attack \/ disrupt the data display on the screen.<\/p>\n<p><strong>CREEPERS <\/strong><br \/>A program, such as worms, which menyerbar from other terminals to the network in the ARPANET (1970s) while displaying the message &#8220;I&#8217;m the Creeper, catch me if you can&#8221; to this program will be liquidated by &#8220;The Reaper&#8221;.<\/p>\n<p><strong>Salamis<\/strong> <br \/>A program that attacks the values of the money in the bank transaction files, especially the value of fractional <br \/>Value fractions (cents) from the interest taken and transferred to the account of another person<\/p>\n<div class=\"blogger-post-footer\">http:\/\/www.google.com\/ig\/adde?moduleurl=http:\/\/feeds.feedburner.com\/time\/topstories&#038;source=imag&#038;val=3<img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/1027942875318741818-3636100883354235874?l=arifadicty.blogspot.com' alt='' \/><\/div>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/i2VzA9_9S4jfFNfUsCl51dQ3LWo\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/i2VzA9_9S4jfFNfUsCl51dQ3LWo\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~a\/i2VzA9_9S4jfFNfUsCl51dQ3LWo\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/i2VzA9_9S4jfFNfUsCl51dQ3LWo\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/blogspot\/TmdD\/~4\/JiZSI7eFfzg\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MALICIOUS CODE Viruses&#8211; A program that has the ability to &#8216;break away&#8217; and to&#8217;copy &#8216;into the program \/ other systems &#8211; Depending on other programs. &#8211; Be active when &#8216;something&#8217; that contains a virus run. &#8211; Usually within one operating system, although there are different operating systems &#8211; Infect: Memory and storage Worms&#8211; Does not [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-129646","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/129646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=129646"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/129646\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=129646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=129646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=129646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}