Interactions and Disconnections.

The Xor Strategy.

Overwrite = A virus software i.e. that which is virus infected.

Overwriting = It involves two main procedures:

1.  Interactions in computer hardware and software – Deleting the host command system from the system core, in that case the whole procedure of INPUT>PROCESSING>OUTPUT is controlled by you or the hacker.
2. Disconnections of computer hardware and software – Blocking all instructions from the command system to the system core, in that case the whole procedure of OUTPUT is controlled by you or the hacker.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s