Virus Attacks
Have you been a victim of e-bombs? Tragic events provoke Virus writers to create more havoc! Take the rediff biz quiz and Check out how they rock cyberspace.
Biz Quiz is best viewed in Internet Explorer (IE) and Netscape above version 6.0.
1. What is e-mail spoofing? a) Mail from a fake id b) Mail from unknown source c) A deceived mail
Wrong! Try again..
Wrong! The correct answer is mail from a fake id. It is a kind of e-mail that appears to originate from one source although it has actually been sent from another source. This can be done for reasons like defaming a person or for monetary gain.
Correct! It is a kind of e-mail that appears to originate from one source although it has actually been sent from another source. This can be done for reasons like defaming a person or for monetary gain.
2. What is e-mail bombing? a) Sending corrupt mail b) Virus attack on e-mail c) Sending huge chunks of mail
Wrong! Try again..
Wrong! The correct answer is sending huge chunks of mail. E-mail bombing means sending large amount of mails to the victims as a result of which their account or mail server crashes. The victims of e-mail bombing can vary from individuals to companies and even the e-mail service provider.
Correct! E-mail bombing means sending large amount of mails to the victims as a result of which their account or mail server crashes. The victims of e-mail bombing can vary from individuals to companies and even the e-mail service provider.
3. What is Webjacking? a) Posting false info on the site b) Hacking a site c) Destroying the site layout
Wrong! Try again..
Wrong! The correct answer is hacking a site. This term has been taken from the word hijacking. Once a website is webjacked the owner of the site loses all control over it. The person gaining such kind of an access is called a hacker who may even alter or destroy any information on the site.
Correct! This term has been taken from the word hijacking. Once a website is webjacked the owner of the site loses all control over it. The person gaining such kind of an access is called a hacker who may even alter or destroy any information on the site.
4. What is Phishing? a) Personalised service through sites b) Selling credit cards through sites c) Directing you to fake sites
Wrong! Try again..
Wrong! The correct answer is directing you to fake sites. Phishers direct victims to fake sites and persuade them to disclose their personal information like credit card or social security numbers, account user names and passwords. The fake websites resemble original e-commerce sites that the victims are easily fooled.
Correct! Phishers direct victims to fake sites and persuade them to disclose their personal information like credit card or social security numbers, account user names and passwords. The fake websites resemble original e-commerce sites that the victims are easily fooled.
5. What is DonBomb? a) SMS virus b) Computer virus c) E-mail virus
Wrong! Try again..
Wrong! The correct answer is e-mail virus. This happened during the London bomb blasts. DonBomb is a technique used to spoof news agencies to increase infection. DonBomb posed as the news footage of the terrorist attack in London. The e-mail with a subject line 'terror hits london', was used from a spoofed e-mail address, a CNN newsletter and recipients were asked to 'see attachments for unique video shots..
Correct! This happened during the London bomb blasts. DonBomb is a technique used to spoof news agencies to increase infection. DonBomb posed as the news footage of the terrorist attack in London. The e-mail with a subject line 'terror hits london', was used from a spoofed e-mail address, a CNN newsletter and recipients were asked to 'see attachments for unique video shots.