There are many types of virus such as Resident, direct action, Multipartite, boot sector, overwrite, polymorphic, macro, directory, fat,
file infector, web scripting, companion and Spacefiller. To be avoided from this threat, it is better to not open any attachments unless
the user knows about the sender. Refusing to open unknown emails is the best way to keep user from this trouble.
Worms are similar to viruses and the only differentiation is regarding coding and the way of duplication.
* To know which software is suitable for your system to prevent from viruses, please do not hesitate to contact us.
Logic Bombs are computer codes and are not active itself. When a logical event happens they would be triggered. After being triggered it can perform any number
of malicious activities. Detecting Logic Bombs is difficult according to their nature that is only consisted of a number lines of codes. Logic Bombs could not be
counted as a kind of virus because it could not duplicate itself like virus.
* To know which software is suitable for your system to prevent from Logic bombs, do not hesitate to contact us.
Trojan horses would be able to delete data, stealing personal or confidential information or even destroy directories and sub-directories. This threat has several
types such as data sending, remote access and so on. The most essential information that could be helpful for a person with destructive purposes is having information
about the anti-virus which is used by the target system. By this information this person can create a specific Trojan for the target system.
* To know which software is suitable for your system to prevent from Trojan horses, do not hesitate to contact us.