1118 Budapest, Törökugrató u. 6.+36 (1) 655-5222‬  info@starksolution.eu

When we talk about data security, we need to consider a wide range of risk set. We talk about a group of solutions that protects endpoints against data theft and data leakage. This solution set can contain protections against harmful viruses, spyware and spam as well as the use of mobile devices connected to the network, the data flowing through the USB drives or internal  restrictions of access to confidential data. A set of multi-layered, well-aligned solutions can significantly reduce the risk and provide  security to the owners of the business informations.

 

 

Viruses, destructive programs - The general name virus is justified by two main characteristics: infect silently and spread with reproduction . The name has become a generic category for destructive programs, and reamined valid to this day, but from a professional and security standpoint we do make a difference between them in the present.

Boot virus – spreads with infected system disks . When the system is loading, they will be loaded to the memory and infect everything from there. On modern operating systems they are virtually ineffective.

File viruses – they bond themselves to any executable file , and start with the file . Their damage is instant , which  usually ends up damaging the user's computer , or  stored data etc.  If you are using a modern operating system, the chance and the size of the possible damage is smaller.

Macro viruses - in principle all macro capable document file can contain macro - malware programs , but the most commonly these programs are written in Microsoft Office  Visual Basic macro language , and spreads through document files. They are capable of causing any kind of damage. Protection agaist them is relatively easy: it should not be allowed to the document interpreter (eg MS Word) to launch macros without approval. This is a default setting in the MS Office.

Worm – a program code that multiplyes without infecting other programs. Their aim is to slow down  the system , limit its functionality, obstruct the useage . Does not include destructive routines.

Trojan Horse - a malware program that  opens a back door for the "owner" after  intrusion, and allows him to seamlessly take complete control of the system . Does not proliferate.

Spyware - Today, a significant portion of the active viruses are the the so-called spywares,  which illegally gets in through the internet and - usually for marketing purposes -  shares information about our system ,  our habits, web intrests and purchases or tamper us with unwanted advertisements. Spywares do not destroy or cause damage (its not in the intrest of the creator), their operations are hardly noticeable.

 

Our Company

The main profile of Stark Solution Ltd. is designing and constructing virtualized systems, IT security solutions and online communication networks. Our skilled professional team is prepared to put  our customers ideas into reality.

 

Facebook