answersLogoWhite

0


Best Answer

firewall

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

uac

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Hardware or software that prevents hackers or malicious software from getting into your computer without your knowledge?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

A firewall can be either hardware or software?

A firewalll is hardware or software that prevents hackers or malicious software from getting into your computer without your knowledge.


When should you wear a wrist strap?

when dealing with the hardware in a computer system, if prevents you from being electricuted, and prevents you from damaging the computer hardware...


How do you prevent viruses?

Install the AntiVirus software and scan your computer. The AntiVirus prevents any kind of malicious software and viruses.


How does the hardware prevent a user progam from gaining complete control of the CPU?

The hardware for the computer prevents a user program from gaining complete control of the CPU by the use of firewalls. A firewall also prevents outside forces from taking over the CPU.


What does an intrusion prevention system do?

An intrusion prevention system, as the name suggests, is a computer network appliance that prevents network access to individuals or viruses that are deemed to have malicious intentions.


What is the function of post test and importance?

The power-on self-test (POST) is the first thing that the BIOS does when the computer is powered on. The POST ensures that hardware is in working order and prevents the following bootstrap loader code from being interrupted due to hardware issues.


Is it a good idea to turn on the boot protection on your coumpter?

Unless you're developing your own operating system, or are using an operating system that cannot take advantage of this feature, it would be advisable to enable this feature. It prevents malicious code from modifying your computer's startup process, which could be done to insert stealth drivers or even a hypervisor (an operating system that runs other operating systems virtually using hardware virtualization).


What are some examples of spyware removal tools provided by Microsoft?

Some examples of spyware removal tools provided by Microsoft includes Microsoft Malicious Software Removal Tool, Microsoft Security Essentials and Microsoft Spyware Removal. These tools are important for a computer to possess because it provides safety for your computer and prevents unwanted software from entering into your computer.


What is a antivirus and what can it do?

Antivirus or anti-virus software (usually written as the abbreviation AV) is software used to prevent, detect and remove malware (of all descriptions), such as: computer viruses, malicious BHOs, hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods. Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software.


What is the significance of filing exempt on taxes?

it prevents computer viruses


What do repair people do to get rid of computer viruses and spyware?

The exact procedure varies depending on the infection. Typically, the computer will be booted into safe mode, which prevents many kinds of malicious programs from running. It is then scanned using antivirus and antimalware software to detect and remove the malicious programs. In some cases, the computer may be so severely infected that this is not possible; as a last resort, files from the infected computer may be backed up to another drive, and the infected computer's hard drive will have to be erased. Then, Windows (or whatever operating system) is reinstalled on the drive. After the backed up files have been scanned on another computer to ensure there are no infected files in the backup, they can be replaced onto the clean computer. (If the files in the backup are damaged or infected and cannot be fixed, those files will also have to be deleted.)


What Prevents other computers on the Internet from accessing a computer?

Firewall