Caught in the Web
Don't give Bill Gates any money
OpenOffice is a suite price
www.open office.org
This column first raved about OpenOffice almost five years ago. Now as the project celebrates its fifth anniversary the full 2.0 version of the free, full-featured office suite is available and it looks better than ever. Supported mainly by Sun Microsystems, OpenOffice gives you everything youd expect from Microsoft Office and then some. It comes with its own equivalent of Word, PowerPoint, Access and Excel, as well as separate programs for graphics and math calculations. As always, it is cross-platform compatible whether youre using Windows, Mac, Linux or Solaris and import and convert documents from Word, Word Perfect and other programs and formats. Best of all you can download it for free ideal for anyone on a budget or who just resents making Bill Gates even richer. More than 50 million users cant be wrong but some reviewers claim that OpenOffice is too bloated and can be a serious drain on your PCs resources. For free, what do you have to lose
http://bermudasun.1upsoftware.com/main.asp?SectionID=9&SubSectionID=230&ArticleID=27475&TM=60964.77

PC-Mac Support , Windows & Apple & Android systems A+ PC-Mac Computer Technician, bdamusic@gmail.com Email me! 238-1777,Facebook http://tinyurl.com/36sqj5u PC & Apple service at your home: connect your PC or Mac to the Internet:install IP security cameras:install wireless network: Vitamin D surveillance software Reseller
Monday, November 07, 2005
Saturday, November 05, 2005
“Phishing”-Trojan
“Phishing”
Definition: Phishing is a type of attack aimed at obtaining a user's personal or confidential information. It typically involves some sort of spam email designed to lure a user to a spoofed web site.
Also Known As: Phishing Attack, Phishing Scam
...................................................
Definition: A Trojan is a program that appears to be legitimate, but in fact does something malicious. Trojans were responsible for the Distributed Denial of Service (DDoS) attacks suffered by Yahoo and EBay in the latter part of 1999. In fact, Trojans are often used to gain backdoor access - that is to say remote, surreptitious access, to a user's system. Trojans do not replicate as viruses do, nor make copies of themselves as worms do.
There are several different types of Trojans: Remote Access Trojans (RATs), Backdoor Trojans (backdoors), IRC Trojans (IRCbots), and Keyloggers. Many of these different types can be employed in one Trojan. For example, an Keylogger that also operates as a backdoor or RAT may commonly be hidden inside game hacks. IRC Trojans are often combined with Backdoors and RATs to create collections of infected computers known as botnets.
Definition: Phishing is a type of attack aimed at obtaining a user's personal or confidential information. It typically involves some sort of spam email designed to lure a user to a spoofed web site.
Also Known As: Phishing Attack, Phishing Scam
...................................................
Definition: A Trojan is a program that appears to be legitimate, but in fact does something malicious. Trojans were responsible for the Distributed Denial of Service (DDoS) attacks suffered by Yahoo and EBay in the latter part of 1999. In fact, Trojans are often used to gain backdoor access - that is to say remote, surreptitious access, to a user's system. Trojans do not replicate as viruses do, nor make copies of themselves as worms do.
There are several different types of Trojans: Remote Access Trojans (RATs), Backdoor Trojans (backdoors), IRC Trojans (IRCbots), and Keyloggers. Many of these different types can be employed in one Trojan. For example, an Keylogger that also operates as a backdoor or RAT may commonly be hidden inside game hacks. IRC Trojans are often combined with Backdoors and RATs to create collections of infected computers known as botnets.
Subscribe to:
Posts (Atom)