Windows Vista\Windows 7 Security Center secures a PC by alerting when security software is out of date or when your security settings should be strengthened. The Security Center also displays your firewall settings and automatic updates are enabled or not.
Software is considered malware (malicious software) based on how the software is intended to be used. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, and other malicious and unwanted software
A boot sector virus stays resident by infecting the boot sector of the computer
A Master boot record (MBR) virus infect the first physical sector of all affected disks
File viruses either replace or attach themselves to executable files, and most commonly found virus.
Macro virus attaches itself to documents in the form of macros.
Memory viruses are viruses that execute and stay resident in memory. Trojan Horse is an example of memory virus.
A trojon is not a virus. The principal variation between a Trojan horse, or Trojan, and a virus is that Trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Trojan may work as a client software on your computer communicating with the Trojan server over the Internet.
Note that script files may include viruses hidden inside. Therefore, it is not wise to open any script file attachments such as file.scr or file.bat etc.
Cert-Ex™ Exam Simulators, Cert-Ex™ Network Simulator, Cert-Ex™ Cheatsheets are written independently by CertExams.com and not affiliated or authorized by respective certification providers. Cert-Ex™ is a trade mark of CertExams.com or entity representing Certexams.com.A+™ is trademark of CompTIA® organization.