Follow Us
Stay connected with us to see how our learners grow, explore, and shine. Follow us for updates, events, and stories that celebrate learning beyond the classroom.
The term "malware" means any malicious program on a computer or mobile device.
These programs are installed without the permission of users and can cause a number of unpleasant effects, such as slowing computer performance, getting your system for personal data, erasing data or even affecting the operation of computer.
These programs are kind of software developed by people called hackers.
These are programs that damage multiple files on a computer. They spread to other computers when carried by users on a physical media, such as flash disks.
Worms don't require human help in order to spread and infect: they infect once and then use computer networks to spread to other machines. worms make many copies of themselves and consume system resources which makes the computer slow.
It spies on what you're doing on your computer and collects data such as keystrokes, browsing habits and even login information or passwords, which is then sent to third parties. It may also modify specific security settings on your computer.
Adware is the most common online nuisances. The programs automatically deliver advertisements to host computers on the internet. They include pop-up ads on webpages with advertisements that often comes with "free" downloads.
Ransomware infects your computer, then hides your useful Information and then send you a message demanding a payment to decrypt your data. If you refuse to pay, the data is deleted permanently. Some ransomware hackers lock out all access to your computer. They might claim to be the work of legitimate law enforcement agencies and suggest that you've been caught doing something bad; that you pay a fine for wrong doing; or, just let you know that you’ve been hacked.
Rootkits allow remote access or control of a computer by another person.
These programs are useful for IT professionals trying to troubleshoot client’s computers at a distance, but they can easily become misused: Once installed on your computer, rootkits allow attackers to take complete control of your computer to steal data or install other pieces of malware. Rootkits are designed to go unnoticed and actively hide their presence.
These are commonly called "Trojans," these programs disguise as legitimate software. Once downloaded and installed, Trojans make changes to a computer and carry out malicious activities, without the knowledge of the victim.
Trojans are common on sites that give free software.
Bots are programs designed to automatically carry out specific operations. They're useful for many legitimate purposes, but have also been reused as a type of malware. Once on a computer, bots can cause the machine to execute specific commands without the user's approval or knowledge.
Hackers may also try to infect multiple computers with the same bot to create a robot network, which can then be used to remotely manage compromised computers to steal sensitive data, or to spy on the victim's activities.
More files show up that you didn’t create. Some of these files have same names your files and when clicked they don’t show anything.
Your files may change appearance with different icons and size in MBs or KBs and do not work.
Whenever you connect to the internet you may notice a different home page.
Hi! My name is Mulungi Xavier. I’m 11 years old. I am at GMS School in Nabbingo. I am in Primary Six, 2025. I made this website as part of my school project. It is my research on system security. I had a lot of fun working on it and learning new things along the way.
Thanks for visiting my site, I hope you liked it!