A Glance At Malicious Attacks In Web
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Web usage is one of the great important to all users in this era. For each and every need internet or web is made use of. Users make use of the area as a medium for searching information, performing business transactions, and also for entertainment. It serves as an attractive area for attackers too. Hence there is at most importance to protect our data that is being exposed in web against any sort of malicious attacks. Malware, short for malicious software is a software use to disrupt computer operation, gathers sensitive information or gain access to pri vate computer system. It can also appear in the form of code, scripts, acti ve content and other soft ware. Malware is different from different software which is legitimate software but contents harmful bugs that were not corrected before release.
Authors and Affiliations
Adithya S Kumar, Neethu S N, Deepthy Mathews
Securitized Patient Monitoring Telemetry System Using Zigbee
Nowadays due to the increase of elderly people across the world the problem of home-care for elderly people is becoming a challenging task. To overcome this wireless sensor networks are used to structure home-care sy...
A Freight Stabilization Model Based On Cloud Segregating For the Shared Cloud
Cloud computing having tremendous growth on recent years but it is not segregation on shared clouds. Clouds are most provably used for huge amount of data storage and communication. "The cloud", also focuses on incre...
Network Processing of PT-TOPK Queries Using Necessary Set Based Algorithm in WSN’s
A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports innetwork top-k query process over uncertain data in a distributed wireless sen...
AR Simulated Camera
This paper provides an interactive idea for interior designing application using augmented reality (AR). Augmented reality merges real world and virtual world together. Due to the developing technology and lack of time,...
Elimination Of Repeated Data Copies With Enhanced Security In Hcloud
Intending at economically solving the trouble of deduplication with discrepancy privileges in cloud computing we regard as a hybrid cloud structural design consisting of a public cloud and a private cloud. Dissimilar...