![]() ![]() ![]() They don’t know about the holes, but they have a list of all the other places from which you could be spied on. Anti- spyware 1 tools are kind of like security cops.The term anti-malware is really a catch-all for a couple of different approaches. If the hole is big enough, they can even reach in and steal personal things or flush your toilet when you’re not looking.Ī software exploit can do things like look at the information on your computer, steal personal things like your passwords, or use your computer to send spam when you’re not looking.Īnd yes, I just compared spam to whatever you flush down your toilet. It shouldn’t be there, but as long as no one knows about it, all is well.Īn exploit is like someone finding the hole and looking in at whatever’s happening in your bathroom. Naturally, you’d like to have the problem fixed and the hole repaired (i.e., you’d like your software to be updated to remove the vulnerability), but as long as the hole hasn’t been found by anyone, it’s not putting you at risk. It’s kind of like a hole in a bathroom wall: as long as no one’s looking through it, there’s no damage done. Vulnerabilities and ExploitsĪ vulnerability in software isn’t a bad thing in and of itself. Once malware gets onto your machine, it can do anything. Avoid malware by using suitable tools, keeping everything up to date, and practicing safe computing. Malware can make its way to your machine any of several ways, including poor security software, out-of-date security software, un-patched and out-of-date system software, and user error. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |