possible malicious software

  • 31Sécurité logicielle des smartphones — La sécurité logicielle des smartphones est devenue une préoccupation de plus en plus importante de l informatique liée à la téléphonie mobile. Elle est particulièrement préoccupante car elle concerne la sécurité des informations personnelles… …

    Wikipédia en Français

  • 32Organized crime — Crime syndicate redirects here. For the DC Comics group of villains, see Crime Syndicate. For other uses, see Organized crime (disambiguation). Al Capone, a name often associated with organized crime …

    Wikipedia

  • 33USB flash drive — JumpDrive redirects here. For the fictional propulsion system, see Jump drive. SanDisk Cruzer Micro, a brand of USB flash drives …

    Wikipedia

  • 34Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …

    Wikipedia

  • 35.NET Framework — This article is about the Microsoft technology. For the Top level domain, see .net. For other uses, see .NET. .NET Framework Developer(s) Microsoft …

    Wikipedia

  • 36Windows Live OneCare — A screenshot of Windows Live OneCare 2.5.2900.03 …

    Wikipedia

  • 37Kernel Patch Protection — (KPP), informally known as PatchGuard, is a feature of x64 editions of Microsoft Windows that prevents patching the kernel. It was first introduced in 2005 with the x64 editions of Windows XP and Windows Server 2003 Service Pack 1.cite web… …

    Wikipedia

  • 38Cyberwarfare — Cyberwar redirects here. For the video game, see Cyberwar (video game). For the 2004 movie, see Cyber Wars (film). For the 1999 MMOG, see Cyber Wars. Computer security Secure operating systems Security architecture Security by design …

    Wikipedia

  • 39Panda Cloud Antivirus — Panda Cloud Antivirus …

    Википедия

  • 40Cryptovirology — is a field that studies how to use cryptography to design powerful malicious software. The field was born with the observation that public key cryptography can be used to break the symmetry between what an antivirus analyst sees regarding a virus …

    Wikipedia