answersLogoWhite

0

If the software is kept up to date, and a firewall and anti-virus software is being used, then there are really no vulnerabilities. Unless the user takes risks with downloading unknown files; or opening unknown attachments on e-mails.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

Are You are more vulnerable to a hacker attack on a Windows system than you are on a Linux system?

You'd be safer than your computer If you danced in front of a lion that was on crystal meth...


What is an antonym for immune system?

Virus


What are the drawback of networking computer?

It makes the computer vulnerable to unauthorized access through the network.


What is a vulnerable computer designed to entice an intruder to hack into it?

Any computer that allows internet access to update the computer.


Which applications are most vulnerable to viruses?

If you do not have any protection to your computer, your system applications are at risk: in basic terms, your C:/ where all your critical computer operating files are stored. That is the first location a virus is designed to attack.


What is purpose of an operating system?

operation system provides and interface between you and computer so that you can communicate easily with computer.


Is a computer a physical system or a conceptual system or both?

A computer is a physical system which works on conceptual basics. so you can say it's both.


What is tandem computer system?

A tandem computer system is a system that has built in redudencys so in case of a hardware failure it can still continue to work.


How do you use the word vulnerable in a sentence?

I felt vulnerable because the door could not be locked. The outlying parts of the empire proved vulnerable to attacks by enemies. With proper protection, a computer is vulnerable to viruses and other malware.


What is a virtual attack on computer system?

A virtual attack - is an attempt by someone over the internet to gain access to a computer's hard-drive. Any computer connected to the 'net is vulnerable to attack - which is why it's vital to have good fire-wall and virus detection programs.


What is penetration testing?

Penetration testing is a process designed to evaluate the security of a computer system or network. A mock attack is staged in order to determine whether the system is vulnerable to attack. Suggestions are then made to the system's owner, in order to improve security.


What computers are vulnerable to hackers?

Historically speaking, any computer that is connected to a public network and running a Microsoft Windows operating system is more vulnerable to attack than any other operating system. Particularly, out of date, and unpatched versions of windows are worse off than otherwise. This is due to several factors - Windows Operating Systems usually have more security vulnerabilities than other operating systems do, but mostly they are more vulnerable because of the popularity of windows. There are many more people using Windows than other Operating Systems, so there is more incentive for hackers to target it.