INFORMATION IN THIS CHAPTER
Over the years, we have encountered multiple varieties of worms, Trojans, and viruses. All these items had one thing in common: they attempted to utilize our PCs to perform some malicious activity. This malicious software would attempt to infect us through avenues such as spam, corrupt Web sites, and trick you to click on a link. Let’s not forget about the e-mails we received from friends which told us to check out a cool picture or video. How many people clicked on those? If you’ve been in the security arena for very long, you know tonnes of people did.
Once a machine ...