Author name: Tech Ham

What is malicious code (software) and how can it be overcame?

(Part One – Serie 5 of 5) What is malicious code (software) and how can it be overcame

Control Methods To Malicious Codes – Software – Attacks In this section as we conclude our part one series, we look at three types of controls: developmental, operating system, and administrative as we look at protecting our systems from malicious code, worms or attackers . We discuss each in turn. Developmental Controls Software development is often considered …

(Part One – Serie 5 of 5) What is malicious code (software) and how can it be overcame Read More »

What is malicious code (software) and how can it be overcame?

(Part One – Serie 4 of 5) What is malicious code (software) and how can it be overcame

Viruses as a type of malicious code (software) A virus a program that can spread the malicious code to other non malicious programs by modifying them. This virus is similar to biological virus because it affects the other healthy file by attaching itself to the program and either destroying it or coexisting with it. Because …

(Part One – Serie 4 of 5) What is malicious code (software) and how can it be overcame Read More »

What is malicious code (software) and how can it be overcame?

(Part One – Serie 3 of 5) What is malicious code (software) and how can it be overcame

Introduction to data, programs and malicious code By themselves, programs are seldom security threats. The programs operate on data, taking action only when data and state changes trigger it. Much of the work done by a program is invisible to users, so they are not likely to be aware of any malicious code activity. For instance, …

(Part One – Serie 3 of 5) What is malicious code (software) and how can it be overcame Read More »

What is malicious code (software) and how can it be overcame?

(Part One – Serie 2 of 5) What is malicious code (software) and how can it be overcame

Non – Malicious Code (Program) Errors Being human, programmers and other developers make many mistakes, most of which are unintentional and non-malicious. Many such errors cause program malfunctions but do not lead to more serious security vulnerabilities. However, a few classes of errors have plagued programmers and security professionals for decades, and there is no …

(Part One – Serie 2 of 5) What is malicious code (software) and how can it be overcame Read More »

Malicious Software, Attacker

(Part One – Series 1 of 5) What is Malicious Software and How Can it be Overcame? A Serie of Five to Take you Through

As a team at Techaai, we decided to dig deep into malicious software, there causes, impact on our systems and how they can be overcame. After writing about the 5 tips to protect your website from malicious attacks, we received a lot more on inquires on how one may protect themselves from such malicious software …

(Part One – Series 1 of 5) What is Malicious Software and How Can it be Overcame? A Serie of Five to Take you Through Read More »

How to Secure Your Yahoo Email Account

4 Tips on How to Secure Your Yahoo Email Account

On the 15th of December 2016, Yahoo  disclosed a new data breach which she said to have occurred in the month of August 2013. The company says the attack affected around 1 Billion users and it’s separate from the attack reported in September 2016 – affecting around 500 million accounts in 2014.   The big internet …

4 Tips on How to Secure Your Yahoo Email Account Read More »