Computer virus

Results: 2414



#Item
281Computer hardware / Computing / Cybercrime / Computer storage devices / Non-volatile memory / USB flash drive / USB / Computer virus / AutoRun / Drive letter assignment / Social engineering / Personal computer

1 Users Really Do Plug in USB Drives They Find Matthew Tischer† Zakir Durumeric‡† Sam Foster† Sunny Duan† Alec Mori† Elie Bursztein3 Michael Bailey† †

Add to Reading List

Source URL: zakird.com

Language: English
282

A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password 2) Anti Virus, Fir

Add to Reading List

Source URL: www.communitytechnology.org.uk

Language: English - Date: 2011-03-16 06:51:40
    283

    Practical Steps for Prevention and Protection o Computer software and configuration  Password protect all your computers, phones, tablets, devices (rotate the frequency of your shields)  Use current anti-virus soft

    Add to Reading List

    Source URL: social.education.purdue.edu

    Language: English - Date: 2012-08-10 16:00:22
      284Cyberwarfare / Computing / Computer security / Computer network security / Internet security / Cryptography / Cybercrime / Electronic voting / Malware / Denial-of-service attack / Computer virus / Computer worm

      Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

      Add to Reading List

      Source URL: avirubin.com

      Language: English - Date: 2012-11-01 14:51:07
      285Computer network security / SentinelOne / Zero-day / Antivirus software / Malware / Palo Alto Networks / Computer security / Computer virus / Carbon Black / ForeScout Technologies

      SC AWARDSExcellence Award Excellence Award

      Add to Reading List

      Source URL: go.cyphort.com

      Language: English - Date: 2016-03-26 18:26:47
      286Computing / Cyberwarfare / Botnets / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Domain generation algorithm / Malware / Sality / Denial-of-service attack / Computer virus

      AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2014-09-29 02:03:52
      287Internet censorship / University of Toronto / Internet security / Computing / Software / Internet / Psiphon / Internet censorship circumvention / Citizen Lab / Gmail / Computer virus / Malware

      Research Brief March 2014 The Citizen Lab Maliciously Repackaged Psiphon Found

      Add to Reading List

      Source URL: citizenlab.org

      Language: English - Date: 2015-03-18 14:57:30
      288Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

      BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2007-05-15 01:33:26
      289Computer network security / Spamming / Cyberwarfare / Cybercrime / Spyware / Salvatore J. Stolfo / Simulation / VM / Computer virus / Hypervisor / Malware / Keystroke logging

      BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S

      Add to Reading List

      Source URL: ids.cs.columbia.edu

      Language: English - Date: 2011-09-04 10:44:35
      290

      ILOVEYOU Virus ILOVEYOU is a computer virus, which affected tens of millions of Windows users inIt was sent as an email attachment with “ILOVEYOU” in the subject line. The attachment was a Visual Basic script,

      Add to Reading List

      Source URL: www.trojangifthorse.com

      - Date: 2014-02-09 15:58:16
        UPDATE