Open Source Your Knowledge, Become a Contributor
Technology knowledge has to be shared and made accessible for free. Join the movement.
Exploitation
An achievement in the field of computer security is an element of a program allowing an individual or a Malware to exploit a security vulnerability in an operating system or software. Worms exploit remote vulnerabilities to automatically spread from one PC to another within a network. For example, the Conficker worm, to spread itself, exploits the vulnerability (MS08-067) within the Windows operating system.
Prévention et protection
The operating system and software must be updated regularly by the user because the mere presence of a Software may be sufficient to infect the computer.
To protect themselves from exploits ?
Open Source Your Knowledge: become a Contributor and help others learn. Create New Content