To navigate to frequent Internet users, the virus exploits a vulnerability in Internetbrowsers (Internet Explorer). Some actions that can be produced by the virus is abrowser hijacker:
Change or differ typed destination address in the browser (usually a tactic to hit traffic on a network and strengthen the benefits of Internet advertising.)
Install the Browser Helper Object used to control the browser and completeinformation to the browser (eg address Histroy visited the username and password, and present data on the form) and stored
System settings such as startup programs and Internet settings.
Browser hijackers can be classified as a virus, because the travel system (browser)and return to infect other systems. a type of virus is very popular Cool WebSearch browser hijacker (the redirection of the browser's address cool web search.com) and website block online.com (which displays the message that if the computer is attacked by a virus).
Change or differ typed destination address in the browser (usually a tactic to hit traffic on a network and strengthen the benefits of Internet advertising.)
Install the Browser Helper Object used to control the browser and completeinformation to the browser (eg address Histroy visited the username and password, and present data on the form) and stored
System settings such as startup programs and Internet settings.
Browser hijackers can be classified as a virus, because the travel system (browser)and return to infect other systems. a type of virus is very popular Cool WebSearch browser hijacker (the redirection of the browser's address cool web search.com) and website block online.com (which displays the message that if the computer is attacked by a virus).
0 komentar:
Post a Comment
THANKS FOR YOUR COMMENT.