home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page264.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  100KB  |  817x1045  |  8-bit (256 colors)
Labels: cell phone | hakham | laptop | monitor | mouse | path | reckoner | road | sky
OCR: 196 SECTION CHAPTER 4 returns computer to normal functionality, but the time wasted shutting down and waiting for a reboot adds unnecessary frustration to the comput ing experience Of the major desktop operating systems, Windows has the reputation for being the most vulnerable viruses, worms. and other attacks Some portion of Windows' vulnerability is because its huge user base makes i the biggest target. In addition, anti-establishment sentiments make Microsoft hip adversary for rebellious hackers. Even so, Windows has many security holes which are found and exploited. Although Microsoft is diligent in its efforts to patch security holes, its progr ammers are always one step behind the hackers, and while users wait for patches their com- puters are vulnerable The programmers developing Wi ...