Computer has now become a common thing. Every day, you may be dealing with this matter. Computers and the Internet have helped your work. Ease
of finding information, perform various financial transactions, store
or process data into something that is not overly burdensome. However, behind its simplicity, there are many threats that can damage your data or your computer either a PC or laptop.
When
you find your computer is not working as it should, for example, a slow
computer, hangs, look for the missing data, display annoying when
you're working, you may conclude your computer is infected with a virus.
Actually there are a variety of threats that target when you are working with computers and the internet. This threat can corrupt data, computers, and even steal important data.
Threatening the security of not only the virus. Maybe there are some terms you've heard, but still do not know what he meant. Here's an explanation of things that can threaten your computer or take your critical data.
Adware
This is a program that will display ads on the computer. Will interfere because adware usually will use the resources of the computer, consequently slow running computer. There is also a type of adware that appears in a pop-up which can be annoying when you're working.
Brute Force
An activity to break passwords by combining numbers and letters in sequence. Very dangerous if with this technique, people who are not entitled to succeed to know your password and then misused. To overcome this problem, it is better to use a password that is not
only made up of numbers and letters but also consist of symbols such as
$, #, &, and others.
DDoS
Stands
for Distributed Denial of Service, where a server or computer is
attacked by bombarded submission of data in a very large measure by many
computers simultaneously. As a result, the computer is inaccessible or damaged hardware not being able to accommodate very large data submissions.
Exploit
That is an application that is trying to find and attack the
weaknesses of the system to gain access to or with the intention of
infecting the system or computer.
Fake Antivirus
It works by making the computer as if exposed to the virus and suggest to buy antivirus to overcome the virus.
Hoax
That is the usual hoax propagated via email or website. The effect is a panic or many readers were fooled. Another result is burdensome because the Internet network chain messages of the false news delivered to another person.
Keylogger
Is one that is quite dangerous threat. Keylogger
will record the input is entered via the keyboard to be stored or sent
to someone who is usually used for malicious purposes. This is in particular to watch out for when you enter the password in public places such as cafes. Password entered via the keyboard can be known and may be used for malicious purposes.
One way to avoid the keylogger is by using the On Screen Keyboard when the need to input a password. On Screen Keyboard can be run from a Windows program that is at
Programs | Accessories | accessbility or by typing "OSK" from the Start |
Run on Windows Operating System.
Malware
Usually found on the bootsector on the hard drive, then change the program is first run. Systems that are usually affected first is the Operating System. Infection in Operating Systems This allows the malware to spread
itself or spread a virus on a storage medium such as a CD ROM or Flash
Disk.
Phishing
Is a form of fraud on the Internet by making someone willing to provide important information that is not entitled to know. For example, to create a website that is similar to a bank's website. A victim does not realize she has been tricked setealh then enter a
password that is known by the manufacturer can be used to drain the
victim savings.
Rootkit
A program that aims to hide other programs running. Usually used to spread malware, virus, or keylogger.
Spam
Refers to unsolicited email. Usually
an email advertisement or become inducement for someone to visit a
specific website is actually a phishing or to spread malware. Messages can be sent in large quantities so spend the time to remove it.
Spyware
Is a program that serves to spy on the user in order to get important
information like credit card numbers, PINs or passwords that can harm
the victim because of leaking the information.
Trojan
Acting as if he is a good program that can be used to help the user work. But, in fact in which there is a function that endanger the overall system or to steal confidential information. Trojan easily spread to other computers.
Worm
Is
malware that can copy itself and then sends the results of doubling him
over the network without having to have certain activities performed by
users. The worm can be dangerous because it can be the entry point for viruses, malware or other harmful programs.
Most Recent Article
There has been no response to "Here it is the threat of computers and the Internet in 2015"
Post a Comment