Installed on the user's computer additional programs;
Used for unauthorized analysis of security systems (security analysis software) - scanners of ports and vulnerabilities and burglars of passwords;
Change the settings of the operating system (system modifying software) - rootkits interceptors control (hijackers) and so on. - resulting in a reduction of speed of Internet connection or loss of connection itself, the opening of other home pages or removal of certain programs;
Program the remote control and monitoring can used for remote technical support or access to their own resources, which are located on the remote computer.
Program for automatic download can used to automatically updates, applications and OS updates.
Program for the analysis of security systems used to study the vulnerability of computer systems and other perfectly legitimate purposes.
Passive tracking technologies may be useful to personalize web pages visited by user.
Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:
Email: Нажмите что бы посмотреть