![]() ![]() ![]() It is also used on websites.Ī good example of this kind of application is the case in the banking industry whereby there is the use of the hypertext transfer protocol (HTTP). It s software that gets into a computer system and then bars the owner of the computer from accessing the services or the system until a ransom is paid (Kevin, 2012).This software, therefore, does the encoding of data and therefore there is the only access to the information by the authorized people. These include the apple and Linux computers.Īnother set of vulnerable computers are those that are using Windows Vista, XP 2, Windows 7, and 8 while the other two computers mentioned earlier are affected by windows 8.1. There are various computers that are at risk especially those that are operating certain programs in virtual reality. These include PayPal scams, advertisements that are run on the internet, and people deceived on winning fake lotteries, the fake inheritance scams as well as the eBay scams (Richard, 2013).One factor that is worth noting is that they are developed so that the promiscuous persons can solicit some money from the people with the computers that have been affected by the virus.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |