free.apprcn.com
努力做最好的限免网站

玩游戏获取 TrustPort Antivirus 半年授权

TrustPort 官网有个游戏,可以赢取一年的 TrustPort USB Antivirus 或者半年的 TrustPort Antivirus ,下面我就带你玩游戏啦。

游戏地址:http://www.trustport.com/game/index.html

最少要玩完 5 关才会获得奖励,而由于玩 5 关跟玩完全部的奖励都一样,所以省点力就可以了。点击每一关后面的 「Play」 ,然后进入游戏。

游戏内容是输入文字,而本文最后有全部答案,大家可以参考。在对应的位置里输入对应的字符,这不用我教你了吧?

5 关过后出现奖励,点击 「Go To Prizes」 就可以获取奖励了。

选取你想要的奖励,然后在下面输入邮箱地址,点击 「Send」 即可。测试不用邮箱会收到不同的授权。

下面为答案:

MALWARE IS software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. MALWARE IS a general term used to refer to a variety of harmful code.

SHOULDER SURFING refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. It is commonly used to obtain passwords, PINs, security codes, and similar data. SHOULDER SURFING IS particulary effective in crowded places because it is relatively easy to observe anybody.

PHARMING IS a hacker’s attack aiming to redirect a website’s traffic to another bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. PHARMING HAS become of major concern to businesses hosting e-commerce and online banking websites.

A TROJAN HORSE can be easily and unwittingly downloaded. For example, if a computer game is designed in a way that when opened by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a TROJAN.

HIJACKING IS the modification of a web browser’s settings by a malware, spyware or a virus. A browser HIJACKER may replace the existing web page with its own. These are generally used to force hits to a particular website. Some browser HIJACKING can be easily reversed, while other instances may be difficult to reverse.

RANSOMWARE comprises a class of malware which restricts access to the computer system that it infects, and demands a RANSOM paid to the creator of the malware in order for the restriction to be removed. Some forms of RANSOMWARE encrypt files on the system’s hard drive, while some may simply lock the system and display messages intended to coax the user into paying.

BOTNET IS a term for a collection of software bobots, or bots, that run autonomously and automatically. A botnet’s originator can control the group, remotely and usually for bad purposes. More experienced botnet operators program their own commanding protocols from scratch.

SKIMMING IS the theft of credit card information used in an otherwise legitimate transaction. The thief can procure a victim’s credit card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (Skimmer) to swipe and store hundreds of victims’ credit card numbers.

DIALLER IS a malicious program that changes Internet access via a modem. It diverts dial numbers to lines with excessively high rates. Users usually only discover this once they receive a phone bill which is unusually high. However, with the growth of permanent Internet connections as ADSL or Wi-Fi, this form of malware is slowly fading.

PASSWORD CRACKING IS the precess of recovering passwords from data that have been stored in your computer. The purpose of PASSWORD CRACKING MIGHT be to help a user recover a forgotten password or to gain unauthorized access to a system.

SPYWARE IS mostly used for purposes such as tracking and storing internet user’s movements on the web and serving up pop-up ads to internet users. SPYWARE CAN collect almost any type of data, including internet surfing habits, user logins, and bank account or credit card information.

ADWARE IS any software package which automatically gives advertisements in order to generate revenue. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising options to the types of goods or services featured.

KEYSTROKE LOGGING, often referred to as KEYLOGGIOG, is the action of recording or logging keys struck on a keyboard, typically so that the person using the keyboard is unaware that their actions are being monitored. This means the attacker can easily gain sensistive information such as passwords.

BAITING IS like the real-world Trojan Horse that uses physical media and relies on the curiosity of the victim. The attacker leaves a malware infected USB flash drive in a location sure to be found and gives it a legitimate looking label, and waits for the victim to use the infected device. If a user inserts this device into their PC, they will install malware without knowing.

 

来自“反”斗限免

赞(0)
0 0 投票数
文章评分
订阅评论
提醒
0 评论
内联反馈
查看所有评论
0
希望看到您的想法,请您发表评论x