Page 199 - PYTHON-12
P. 199

(c)  It may disable the antivirus software on the host, which will enable it to cause more damage.
                (d)  Bulk email chaining can be created with an intention to guess email passwords.

                (e)  A worm consumes too much system memory (or network bandwidth), causing web servers,
                     network servers and individual computers to stop responding.
              3. Trojan Horse

              A Trojan horse is a kind of virus that looks safe but has hidden effects. It is a hidden code in a program
              such as a game or a spreadsheet that can damage the system when running these applications. It
              can destroy or alter information on a computer system in the background. Unlike viruses, Trojans
              do  not  replicate  themselves  but  they  are  destructive.  Trojans  are  executable  programs,  which
              means that when a user runs any application or plays games, they work behind that application
              and can damage the system completely.
              There are several types of Trojan Horse:

                (a)  Remote access Trojan horse
                (b)  Data sending Trojans

                (c)  Destructive Trojans

                (d)  Proxy Trojans
                (e)  FTP Trojans

                (f)  Denial-of-service attack Trojans
              Trojans are generally spread through email attachments and exchange of disks and information
              between computers. Worms can also spread Trojans. The damage caused by Trojans is similar to
              that caused by viruses. Sometimes the user is unaware about a Trojan because of its masking effect
              as it runs as a hidden code.

               CTM:  Trojan horse is a hidden code that looks safe but it has some hidden effects while running
               applications.

              4. Spams


              Spam is an unwanted bulk mail which is sent by an unauthorized or unidentified person in order
              to eat the entire disk space. In non-malicious form, it floods the internet with many copies of the
              same message to be sent to a user which he may not otherwise receive. Generally, it is in the form of
              pampering the user with various discount schemes, or commercial advertising, often for dubious
              products, get rich quick schemes, etc. Mobile phone spam is a form of spamming that uses text
              message service of mobile phone.

              Spams can be avoided by using email filtering, spam traps, etc.

               CTM: Spam refers to electronic junk mail that eats up the entire computer’s space.

                                                                                                                  Computer Networks
              8.23 COOKIES

              A cookie is also known as an HTTP cookie, web cookie, internet cookie or browser cookie. When
              the user browses any website, a cookie identifies users and prepares web pages for them which
              are then sent to the web server for later use. Cookie is basically a piece of data that is stored by the

                                                                                                            8.45
   194   195   196   197   198   199   200   201   202   203   204