The latest Blackberry mobile phone that includes hash features and functions enables or supports the secure hashing algorithm using the MD5 hash acceleration. Go to site download the eicar_com.zip file. Open your security setting and activate all the security setting. Posted by Roshan at 9:58 PM 0 comments Question 4 update security policy and frequent meeting with staffĭamage do computer viruses do (n.d.) retrived on 25/12/09: retrived from do not use the corrupted and pirated software only use licensed softwareĥ. up date anti-viruses software in every pcsĤ.
Microsoft windows are the vulnerabilities that are likely to be hhappen.Ģ. What are the vulneralibities that are likely to be happen? destroy the chips in motherboard and corrupt it. destroy the important files and data in computerģ. What damages can do they in computer network?ġ. computer hacker spread viruses in network How viruses are spread in the computer network?Ĥ.
these viruses are not created automatically, people create themselves and makes the copy and distribute themselves breaking the security system. Posted by Roshan at 4:07 AM 0 comments Thursday, December 24, 2009Ĭomputer viruses are the malicious code that are inserted into our computer unknowingly and plays with our system.