Lirik Lagu Sinopsis Film Gaya Hidup
Blackberry LG Mobile Nokia Samsung Sony Ericsson
Klasemen L.Italia Klasemen L.Inggris Jadwal Liga Italia Jadwal Liga Inggris
Resto Enak di Jakarta Resto Romantis di Jkt Hokben Delivery Bakmi GM Delivery PHD - Pizza Hut

This He Threat Computers and the Internet!


Ini Dia Ancaman Komputer dan Internet!When you find your computer is not working properly, such as computers slow, hangs, look for missing data, display annoying when you're working, you may conclude your computer is exposed to the virus. Actually there are a variety of threats that target when you work with computers and the Internet. This threat can damage data, computers, and even steal important data.
Threatening the security of not only the virus. Maybe there are some terms you've heard but still do not know what she meant. Here's an explanation of things that can threaten your computer or take your critical data.

 
Adware
This is a program that will display advertisements on the computer. Will interfere because adware usually will use the resources of the computer, resulting in a slow running computer. There is also a type of adware that appear in pop-ups that can interfere when you're working.

 
Brute Force
An activity to break passwords by combining numbers and letters in sequence. Very dangerous if with this technique, people who are not entitled to succeed to know your password and then misused. To overcome this problem, it's good password that is used not only consist of numbers and letters but also consists of symbols like $, #, &, and others.

 
DDoS
Is a continuation of Distributed Denial of Service, where a server or computer is attacked by bombarded shipment data in a very large size of many computers simultaneously. As a result, the computer is difficult to access or damage to hardware not being able to accommodate very large data items.

 
Exploit
That is an application that trying to find and attack the weaknesses of the system to gain access or with the aim of infecting systems or computers.

 
Fake Antivirus
The way it works is to make it look like a computer virus and suggest to buy antivirus to overcome the virus.

 
Hoax
That is the usual false news spread by email or website. The effect is a panic or a lot of readers are deceived. Another result is burdensome because of the Internet network chain of hoax messages are delivered to another person.

 
Keylogger
Is one threat that is quite dangerous. Keylogger will record the input is entered via the keyboard to be stored or sent to someone who normally used for purposes that are not good. This should be especially wary if you enter a password at public places like cafes. Password that you entered through the keyboard can be known and may be used for purposes that are not good.
One way to avoid a keylogger is to use the On Screen Keyboard when I had to input the password. On Screen Keyboard can be run from the Windows programs that are on Programs | Accessories | Accessbility or by typing "OSK" from the Start | Run on Windows Operating System.

 
Malware
Usually found on bootsector on the hard drive, then change the program that first run. Systems that are usually affected first is the Operating System. Infection in Operating System makes it easy to spread malware themselves or spread a virus on storage media such as CD ROM or Flash Disk.

 
Phishing
Is a form of fraud on the internet to make someone want to give important information that is not entitled to know. For example, by creating a website similar to a bank's website. A victim does not realize he had been duped and then enter the password that setealh known by the manufacturer can be used to drain the victim's savings.

 
Rootkits
That is a program that aims hide other programs running. Commonly used to spread malware, viruses, or keyloggers.

 
Spam
Mean emails that are not expected. Usually an email advertisement or inducement for a person visiting a particular website which is actually a phishing or malware to spread. Messages can be sent in large quantities so spend time to remove it.

 
Spyware
Is a program that serves to spy on users in order to get important information like credit card numbers, PINs or passwords that can be detrimental to the victim because of leaking of information.

 
Trojan
Acting as if she dalah good program that can be used to help the user work. But, actually in it there are functions that endanger the overall system or to steal confidential information. Trojans easily spread to other computers.

 
Worm
Is the malware that can copy itself and then sends copies itself over the network without having a specific activity performed by users. The worm can be dangerous because it can be an entrance for viruses, malware or other destructive programs.

0 comments:

Post a Comment

 
Copyright My magazine © 2010 - All right reserved - Using Blueceria Blogspot Theme
Brought to you by : Cyber Template Best viewed with Mozilla, IE, Google Chrome and Opera.