ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

How does virus spread by email ?

• What is the Trojan Virus. • Is it a spyware ? • What is its signature ?(symptom by which we can recognize the virus ) • Is it like the historical Trojan horse .How does it spread . How dangerous is it. • What are the ways in which a pc can be affected by virus ? • What happens when a WAN is affected by virus ?

user-image
تم إضافة السؤال من قبل Subhranshu Ganguly , Quality Analyst. , WIPRO
تاريخ النشر: 2013/12/21
Raafat Sallam
من قبل Raafat Sallam , Organizational Development and Training Consultant , Training Centers, Marketing Organizations.

Through download files which has infection but it seems to be friendly file.

Muhammad Anzar
من قبل Muhammad Anzar , DevOps/DevSecOps Architect , Confidential

100% chance if we dont have spam filter on email server or antivirus/antispam software at client file. We will get lot of suspicious files through emails. Once clicked, it will computerize the  system

Syed AbduL Ahmed Nadeem Siddiqui Ahmed
من قبل Syed AbduL Ahmed Nadeem Siddiqui Ahmed , IT Adminstartor , Working as Freelancer.

Email Virus is Download script,program or a message that spread itself via communication between two computer over the INTERNET .its effects your browser/file/folder/system file/boot sector etc,it may intercept your communication to obtain your email address,individual who use email addresses for commercial advertising to try to gain profit for themselves.

 

PRECUTION TO BE TAKEN CARE.

 

1. Update your anti-virus software regular,

2. never open file or attachments unless it scan with anti virus software.

3. Never buy anything from span email.

4. Don't reply or click on the links in email or pop-up messages asking for personal information.

5. Always visit company web site.

6. If your cant confirm that the sender is valid,delete the message immediately.

 

Protection against Spam/Phishing/theft or junk mail.

1. Hide your address from spammers by setting you a separate email address dedicated  to web transactions.

2. Block junk email.

3. Review privacy policies when signing up for web-based services.

4. Don't set up email accounts to generate automatic responses while your away from the workplace/computer.

5. Never provide your account password over the phone or in response to an unsolicited Internet request

6. Don’t email personal or financial information. If you initiate a transaction through a Web site, be sure that the site is secure.

7. Review account statements regularly to ensure all charges are correct.

8. Report suspicious activity to the Federal Trade Commission (FTC) through the Internet at http://www.ftc.gov/bcp/edu/microsites/idtheft/ or by calling (877) IDTHEFT.

 

Thanks,

Regards,

Ahmed.

المزيد من الأسئلة المماثلة

هل تحتاج لمساعدة في كتابة سيرة ذاتية تحتوي على الكلمات الدلالية التي يبحث عنها أصحاب العمل؟