Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP

Posts: 610
Joined: Jun 2010
28-06-2010, 09:54 PM

In today™s world, the importance of information cannot be over emphasize. All the services and systems of various organizations and institutions, both government and private, depend on the information fed to them. Information has attained the same or perhaps even greater significance than that of any other tangible object that is of any practical consequence. All this makes it imperative for individuals and organizations alike to safeguard their data and avoid its misuse, destruction, duplication or distribution by unauthorized people, especially after witnessing the havoc that can be unleashed by such attacks.Since the inception of conglomeration of Computers with Networks, the consequence of which shrunk the communication world, hitherto unknown, umpteen ilk of security breaches took their origin. Tersely quoting some security ditherers “ Eavesdropping, Hacking, Hijacking, Mapping, Packet Sniffing, 1Spoofing, Dos attacks, etc.

Recent threats to the information systems of the world have led to unprecedented efforts to seek a way out to stop these miscreants. Organizations the world over have joined hands to combat this menace with their entire technological prowess. These efforts have led to the development of computer security systems that are far more rugged and comprehensive than their earlier counterparts. Computer security has become synonymous with network security. Our paper deals with viruses which are newly entered in to our systemâ„¢s world in the year 2009. Such as Gumblar, Browser plugins, Blackhat SEO, FTP servers, Social networks and how they spread their codes into our pcâ„¢s. The top 5 malware outbreaks during the year 2009 also mentioned.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: supervirus andrew w mitchell, supervirus book,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)