Malware, intrusive software that is designed to damage and destroy computers and computer systems. Examples of common malware includes viruses, worms, trojan viruses, spyware, adware, and ransomware.
Computer Virus, a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
Spyware, a category of software that steals personal information.
Computer Worm, a malicious, self-replicating software program that affects the functions of software and hardware programs.
Trojan Horse, a type of computer software that is camouflaged in the form of regular software that can kill background system processes, delete hard drive data and corrupt file allocation systems.
Keylogger, activity-monitoring software programs that give hackers access to your personal data.
Phishing, a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
Rootkit, a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.
Adware, software that displays unwanted and irritating pop-up adverts which can appear on your computer or mobile device.
Botnet, a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker, used to carry out various scams and cyberattacks.
Fileless Malware, a type of malicious software that uses legitimate programs to infect a computer.
Ransomware, malware that employs encryption to hold a victim's digital information at ransom.
Clickjacking hijacks clicks of a user on a website which effectively translates into leading a user click on something malicious or sharing confidential information details he is not even aware of.
Browser Drive-by Attack, occurs when a user visits a compromised website and malicious code exploits weaknesses or other security vulnerabilities
in the user's web browser or browser plug-ins allowing the download of malicious files to the user's computer
MALWARE Agobot bagle bashlite bifrost blaster bohmini bolgimo boza brontok caribe cih code-red concept conficker cryptolocker ctx daprosy duqu explorerzip gameoverzeus graybird happy99 iloveyou kak kenzero koobface leap locky melissa memz mocmex morris morto mydoom mylife nimda flame laroux ngrbot nyxem nyxem pegasus petya ply psyo0t regin sadmind santy sasser shamoon shlayer skywiper sqlslammer sober sobig sql-slammer staog storm stration stuxnet swen tinba thanatos titanium torpig vbmania vundo wannacry waledac welchia witty xafecopy zeus zlob zotob
HOME
Columns:
One Column Fixed Nav
Two Columns Page
Two Columns 1+2
Three Columns Page
Four Columns Page
Four Columns 1+2+1
Four Columns Expandable
Five Columns Page
Image Formats
Cloud Services
Layouts:
Asymmetrical 1+2 Layout
Asymmetrical 1+3 Layout
Asymmetrical 1+4 Layout
Asymmetrical 2+4 Layout
Asymmetrical 3+1 Layout
Asymmetrical 4+1 Layout
Asymmetrical 4+2 Layout
Offset Layout
Search Engines
ZigZag Layout
Database:
Database Select Query
Database Sort Query
Database Select Europe
Database Select Japan
Database Select US
Database Select Vehicle
Photos:
Photo Full Width
Photo Gallery
Photo Grid
Photo Carousel
Photo Album
Photo Filter
Photo Select
Photo Accordion
Photo Zoom
Photo Scroll
Quizzes:
Web Design Quiz x3
Web Design Logo Quiz x3
Web Coding Quiz x10
Web Development Logo Quiz x10
Graphics:
Refresh Background
Select Background Color
Select Background Image
Parallax Scrolling Effect
Tier List
Magnify Window
Graphic Design
Images Per Page
OSI Model
ADA Website Compliance
Plethora:
Technology Chart
Parsing Python Scripts
Frameworks
Shopping Cart
Website Standards
AJAX Interactive XML
W3C
XHTML
Website Coding
About Eddie Jester