TrustPort have arranged a limited time giveaway. This giveaway is not like other giveaway we have shared before. Instead of just giving away free license by collecting name & email address, Trustport create an encryption game where you have to finish at least the first 5 levels to receive a prize from a selection of cool prizes, including Activation code for TrustPort USB Antivirus for 1-year, Activation code for TrustPort Antivirus for 6-months, promo code 70% off for TrustPort Total Protection.
Follow below simple steps to grab your free license:
1, Visit the TrustPort Encryption Game Page, and click on “Play” button.
2, Finish the game of at least 5 Levels.
3, You can now select your prize. Then enter your valid email address , and click on the “Sent” button.
4, your chosen prize will soon be sent to the email address you provided. Remember…check your spam, your prize may send to this place after you sent the requests.
The answers to all levels (just posting to ease some of your works, credit):
MALWARE IS software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. MALWARE IS a general term used to refer to a variety of harmful code.
SHOULDER SURFING refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. It is commonly used to obtain passwords, PINs, security codes, and similar data. SHOULDER SURFING IS particulary effective in crowded places because it is relatively easy to observe anybody.
PHARMING IS a hacker’s attack aiming to redirect a website’s traffic to another bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. PHARMING HAS become of major concern to businesses hosting e-commerce and online banking websites.
A TROJAN HORSE can be easily and unwittingly downloaded. For example, if a computer game is designed in a way that when opened by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a TROJAN.
HIJACKING IS the modification of a web browser’s settings by a malware, spyware or a virus. A browser HIJACKER may replace the existing web page with its own. These are generally used to force hits to a particular website. Some browser HIJACKING can be easily reversed, while other instances may be difficult to reverse.
RANSOMWARE comprises a class of malware which restricts access to the computer system that it infects, and demands a RANSOM paid to the creator of the malware in order for the restriction to be removed. Some forms of RANSOMWARE encrypt files on the system’s hard drive, while some may simply lock the system and display messages intended to coax the user into paying.
BOTNET IS a term for a collection of software bobots, or bots, that run autonomously and automatically. A botnet’s originator can control the group, remotely and usually for bad purposes. More experienced botnet operators program their own commanding protocols from scratch.
SKIMMING IS the theft of credit card information used in an otherwise legitimate transaction. The thief can procure a victim’s credit card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (Skimmer) to swipe and store hundreds of victims’ credit card numbers.
DIALLER IS a malicious program that changes Internet access via a modem. It diverts dial numbers to lines with excessively high rates. Users usually only discover this once they receive a phone bill which is unusually high. However, with the growth of permanent Internet connections as ADSL or Wi-Fi, this form of malware is slowly fading.
PASSWORD CRACKING IS the precess of recovering passwords from data that have been stored in your computer. The purpose of PASSWORD CRACKING MIGHT be to help a user recover a forgotten password or to gain unauthorized access to a system.
SPYWARE IS mostly used for purposes such as tracking and storing internet user’s movements on the web and serving up pop-up ads to internet users. SPYWARE CAN collect almost any type of data, including internet surfing habits, user logins, and bank account or credit card information.
ADWARE IS any software package which automatically gives advertisements in order to generate revenue. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising options to the types of goods or services featured.
KEYSTROKE LOGGING, often referred to as KEYLOGGIOG, is the action of recording or logging keys struck on a keyboard, typically so that the person using the keyboard is unaware that their actions are being monitored. This means the attacker can easily gain sensistive information such as passwords.
BAITING IS like the real-world Trojan Horse that uses physical media and relies on the curiosity of the victim. The attacker leaves a malware infected USB flash drive in a location sure to be found and gives it a legitimate looking label, and waits for the victim to use the infected device. If a user inserts this device into their PC, they will install malware without knowing.