possible malicious software

  • 11Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …

    Wikipedia

  • 12Windows Vista — Part of the Microsoft Windows family …

    Wikipedia

  • 13Internet Explorer — Windows Internet Explorer A component of Microsoft Windows Internet Explorer 9 in Wi …

    Wikipedia

  • 14Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …

    Wikipedia

  • 15Comparison of privilege authorization features — A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system. Operating systems lacking such features, such as DOS, Windows implementations …

    Wikipedia

  • 16Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …

    Wikipedia

  • 17Spyware — is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically,… …

    Wikipedia

  • 18Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… …

    Wikipedia

  • 19Google Chrome — This article is about the web browser. For the operating system, see Google Chrome OS. Google Chrome …

    Wikipedia

  • 20Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( …

    Wikipedia