LordNevar
BattleForums Addict
- Joined
- Apr 29, 2005
- Messages
- 610
- Reaction score
- 4
- Location
- United States
- Website
- www.valhallalegends.com
EFFECTIVE IMMEDIATELY!
Anyone caught distributing and or posting content containing or linking to anything that is considered malicious will not be given any warnings. This is final, if anyone links to or posts any content that contains such items they will be dealt with on a legal level. This is not acceptable on any level, and will not be tolerated on any level. If you have a file you are unsure of, contact a moderator to have it verified or checked before posting it. This goes for everyone, there are no exceptions to this policy. Off linking to files must be cleared with a moderator before posting as well.
IDENTIFIERS
What is Malware?
Malware is computer code that is designed to damage or disrupt computer systems or to perpetrate other nefarious acts, such as harvesting passwords. The most common types of malware are viruses, worms and Trojan horses. A virus is a computer program that copies itself and inserts the copies into other programs or data files. Like viruses, worms replicate themselves; unlike viruses, they do not attach themselves to other programs or data files but exist independently. Unlike viruses and worms, Trojan horses do not replicate themselves. Trojan horses proliferate by masquerading as benign programs; users are tricked into downloading the program containing the Trojan horse.
[FONT=Arial,Helvetica,sans-serif]• Viruses and worms are spread via e-mail, Web pages or networks that can be self copied and spread to other computers and can frequently cause immense damage to a computer. [/FONT]Malware is computer code that is designed to damage or disrupt computer systems or to perpetrate other nefarious acts, such as harvesting passwords. The most common types of malware are viruses, worms and Trojan horses. A virus is a computer program that copies itself and inserts the copies into other programs or data files. Like viruses, worms replicate themselves; unlike viruses, they do not attach themselves to other programs or data files but exist independently. Unlike viruses and worms, Trojan horses do not replicate themselves. Trojan horses proliferate by masquerading as benign programs; users are tricked into downloading the program containing the Trojan horse.
[FONT=Arial,Helvetica,sans-serif][/FONT]
[FONT=Arial,Helvetica,sans-serif]• A trojan horse program is a detrimental part of software that is hidden as lawful software. Trojan horses cannot reproduce themselves, unlike to viruses or worms, but a few trojan horses can spread or trigger other malware- such as viruses called droppers. [/FONT]
[FONT=Arial,Helvetica,sans-serif][/FONT]
[FONT=Arial,Helvetica,sans-serif]• A backdoor is a piece of software that permits access to the computer system by passing the usual confirmation formalities. [/FONT]
[FONT=Arial,Helvetica,sans-serif][/FONT]
[FONT=Arial,Helvetica,sans-serif]• Spyware comprises computer software that collects the information of computer users and then transmits such information to an outside entity without the knowledge or informed consent of the user. [/FONT]
[FONT=Arial,Helvetica,sans-serif][/FONT]
[FONT=Arial,Helvetica,sans-serif]• Adware or advertising-supported software comprises software applications where advertisements are shown to users while the program is in operation and which insert a supplementary code onto the user's computer in pop-up windows or through a bar that becomes visible on a computer screen. [/FONT]
If anything pertaining to anything above is found on this site, legal action will be taken against the poster. You can laugh all you want, you can say we will never find you, and we can't catch you. You are wrong, we will find you and we will catch you. This is a federal crime, and is very punishable in a court of law. There will not be any mercy to anyone that violates this rule.
PERTINENT INFORMATION
BATTLEFORUMS reserves the right to enforce this law according to the -
BATTLEFORUMS reserves the right to enforce this law according to the -
Computer Fraud and Abuse Act of 1986 (US) 18 USC 1030