virus-prone software

  • 1Corrector Yui — コレクターユイ (Korekutā Yui) Genre Science fiction …

    Wikipedia

  • 2Wikipedia:Reference desk/Computing — The Wikipedia Reference Desk covering the topic of computing. Computing #eee #f5f5f5 #eee #aaa #aaa #aaa #00f #36b #000 #00f computing Wikipedia:Reference de …

    Wikipedia

  • 3Windows Live OneCare — A screenshot of Windows Live OneCare 2.5.2900.03 …

    Wikipedia

  • 4Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …

    Wikipedia

  • 5Sony BMG CD copy prevention scandal — The Sony BMG CD copy prevention scandal concerns the copy prevention measures included by Sony BMG on compact discs in 2005. Sony BMG included the Extended Copy Protection (XCP) and MediaMax CD 3 software on music CDs. XCP was put on 52 titles [… …

    Wikipedia

  • 6Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… …

    Wikipedia

  • 7Internet Explorer — Windows Internet Explorer A component of Microsoft Windows Internet Explorer 9 in Wi …

    Wikipedia

  • 8Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …

    Wikipedia

  • 9Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …

    Wikipedia

  • 10Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …

    Wikipedia