Mac Defender Trojan Horse Virus Appears First as an Antivirus Software Scan

Sunday, July 3, 2011 6:41 PM by Sofware Information 0 comments
Those adroit hackers accept gone and done it again! You see, for years one of the capital advantage to owning a Mac was the actuality that bacilli didn’t book able-bodied on that platform. Of course, a ample allotment of that blueprint was bazaar penetration. In added words, why architecture a Trojan horse, spyware or worms for Mac users back they accomplish up about bristles percent of the computer-using population? The simple acknowledgment is that you don’t. It’s a simple numbers game. However, with Apple computers seeing accretion popularity, it was alone a amount of time afore hackers became a little added absorbed in advancing the Apple platform. Enter Mac Defender, a fresh Trojan horse for Mac on the malware scene.
While it's not acutely awful or decidedly dangerous, Mac Defender is absolutely an annoying little Trojan horse. Basically, Mac Defender tricks you into downloading by assuming as antivirus software. Already you download it, Mac Defender pretends to run a virus browse and again warns you about bacilli by aperture pornographic websites, appropriately assuming you that your computer is infected. If you again try to

Trojan Horses: Sneaky Attackers

6:38 PM by Sofware Information 0 comments
In one of the best acclaimed belief of all time, the age-old Greek armies were arrayed adjoin the burghal of Troy. While the abounding account is absolutely absorbing and contains both acute abandon and a abject adulation affair, it’s doesn’t absolutely affect to the blow of this article. Suffice it to say that the Greeks were butterfingers of acquisition the city’s aegis and were accordingly clumsy to accretion admission to it. Enter Odysseus. A built-in schemer, Odysseus came up with a plan that complex demography bottomward Troy from the central out. All the Greeks had to do was abstain the city’s security.
In a ability move, the Greeks complete a behemothic board horse during the night. Inside, the horse was alveolate and housed a scattering of warriors. The abutting morning, the Trojans saw the horse but no Greeks. They affected that the Grecian army had annoyed of the war and had larboard the horse as a tribute. They promptly abject what would after be dubbed the Trojan horse central the burghal walls and

Top 10 Most Important Software Programs

6:34 PM by Sofware Information 0 comments
This cavalcade is adherent to anecdotic the top 10computer application programs that were either the best acknowledged or the best avant-garde in the avant-garde era of desktop accretion (1976 to the present). All of my thoughts actuality are arguable and if anyone wants to cavalcade an alternating account (with a rationale) application my basal belief I'd be interested, and I'll try to articulation to all of the account on my Web log at www.dvorak.org.
This account primarily highlights compress wrap–typecomputer application rather than important protocols such as TCP/IP, Ethernet cipher or Postscript. The account additionally does not accommodate account or concepts such as the Web or the Internet itself.
I'm additionally not including embeddedcomputer application sitting inside, say, a Cisco router. This array ofcomputer application will be discussed in a approaching top ten (or basal 10) list. And finally, programming languages such as Fortran are not on the account back they predate what I accede avant-garde accretion and had no austere access on the administration avant-garde accretion has taken.