Familiar with the Technology

  • Home
Home » Computers » Computers and Internet threats » Internet » threats » Computers and Internet threats!

Computers and Internet threats!

The computer has now become a common thing . Every day , you may relate to this matter . Computers and the Internet have helped your work . Ease of finding information , perform various financial transactions , store or process data into something that is not overly burdensome . However , behind the simplicity , there are a variety of threats that can damage your data or your computer either a PC or laptop .
When you find your computer is not working properly , such as computers slow , hangs , look for the missing data , display annoying when you're working , you may conclude your computer is infected with a virus . There are actually a variety of threats that target when you work with computers and the internet . These threats can corrupt data , computers , and even steal important data .
Threatening the security of not only the virus . There may be some terms you've heard but still do not know what he meant . Here's an explanation of things that could threaten your computer or take your critical data .

adware
This is a program that will display ads on the computer . Will interfere because adware generally will use the resources of the computer , the computer runs slow as a result . There are also types of adware pop - ups appear to interfere while you're working .


brute Force
An activity to break the password by combining numbers and letters in sequence . Very dangerous if with this technique , an unauthorized person managed to figure out your password then misused . To overcome this problem , it is better to use a password that is not just made ​​up of numbers and letters but also consists of symbols such as $ , # , & , and others .

DDoS
Stands for Distributed Denial of Service , in which a server or computer is attacked by bombarded shipment data in very large measure by many computers simultaneously . As a result of the difficult to access computers or hardware damage due to not being able to accommodate very large data submissions .

exploit
That is an application that is trying to find and attack the weaknesses of the system to gain access to the system or with the intention of infecting or computer .

Fake Antivirus
It works by making the computer as if exposed to the virus and advised to buy antivirus to tackle the virus .

Hoax
That is the usual hoax spread via email or website . The effect is a panic or many readers were fooled . Another result is burdensome because the internet network of hoax chain message is being delivered to another person .

keylogger
Is one that is quite dangerous threats . Keylogger will record the input is entered via the keyboard to be stored or sent to a person who is normally used for purposes that are not good . It should be especially wary when you enter a password in public places such as cafes . Password you entered through the keyboard can be known and may be used for purposes that are not good .
One way to avoid keylogger is by using the On Screen Keyboard when I had to enter a password . On Screen Keyboard can be run from a Windows program that resides on Programs | Accessories | accessbility or by typing " osk " from Start | Run on Windows Operating System .

malware
Usually found on the bootsector on the hard drive , then change the first time the program is run . The system is usually affected first is the Operating System . Infection of the OS it easier for malware to spread themselves or spread a virus on a storage medium such as a CD ROM or Flash Disk .

phishing
Is a form of Internet fraud to get someone willing to provide important information that is not entitled to know. For example , to create a website that is similar to a bank's website . A victim does not realize she has been tricked setealh then enter a password that is known by the manufacturer can be used to drain the savings of victims .

rootkits
That is a program that aims to hide other programs running . Usually used to spread malware , viruses , or keylogger .

spam
Mean unsolicited email . Usually an email advertisement or inducement in order to become a person visiting a particular website is actually a phishing or malware to spread . Messages can be sent in large quantities so spend the time to remove it .

spyware
Is a program that serves to spy on users in order to get important information such as credit card numbers , PINs or passwords that can be detrimental to the victim due to the leaking of such information .

Trojan
Acting as if he dalah good program that can be used to help the user work . However , where there is actual harm to the system functions as a whole or to steal confidential information . Trojan easily spread to other computers .

worm
Is a malware that can copy itself and then sends the results of doubling himself over the network without having to have a specific activity performed by users. The worm can be dangerous because it can be a gateway for viruses , malware or other destructive programs .

Share to

Facebook Google+ Twitter Digg
di 5:11 PM
Label: Computers, Computers and Internet threats, Internet, threats

Newer Post Older Post Home

Entri Populer

  • Free Money System
    Is Free Money System really a good product or is it a scam? ==> See the Secret Now! <== Free Money System Review: Official Pro...
  • How To Make Money With Android Application
    Applications that can be accessed through the Android operating system has been widely circulated and had a lot of wear. Through this techn...
  • Andy Bounds Online
    Is Andy Bounds Online really good or is it just a scam? ==> Click Here to Find Out! <== Andy Bounds Online Review: Official Pr...
  • Bitcoin & Litecoin Survival Guide (view mobile)
    So you’re serious about wanting to make money with your investing, and you’ve heard great things about Bitcoin & Litecoin Survival Guide...
  • Find free money on the internet without a capital Easily
    If we want to learn and diligent fact that the internet can be made ​​as a source of money yes though perhaps not too large in number but no...
  • A Look at Future Technology Fujitsu
    TEMPO.CO   Imagine a time when you no longer need to issue a credit card or money to pay for your purchase. Simply present your palm and the...
  • Video Game Tester Jobs - Get Paid To Play Video Games!
    Are you sick and tired of losing at [GAME_NAME] ? Do you want to know the secrets that can help you level up faster and see the full potenti...
  • Computers and Internet threats!
    The computer has now become a common thing . Every day , you may relate to this matter . Computers and the Internet have helped your work . ...
  • Advanced Technology On Mobile
    The phone is the gadget that became the primary needs of the current era. The main function of this gadget is to communicate via phone or t...
  • Become A Full Time Photographer (view mobile)
    Is Become A Full Time Photographer (view mobile) really good or is it a scam? ==> See the Secret Now! <== Become A Full Time Pho...
Powered by Blogger.

Blog Archive

  • ▼  2014 (17)
    • ►  October (2)
    • ►  July (6)
    • ▼  February (9)
      • Advanced Technology On Mobile
      • Innovative Features Offered Predicts iPhone 6
      • Sony to Supply Sensors Front Camera iPhone 6
      • Pictures and Specifications HTC Desire 8 Revealed
      • Smartphone LG G Pro 2
      • Computers and Internet threats!
      • Apple Starts Production Latest Processor Technology
      • New Sophistication Galaxy S5
      • Windows Immediate Release Windows 8.1
CBTheme
Copyright Familiar with the Technology - Template by Smartphone Review and Technology and Published by WAY TO HEALTHY Back to Top