The computer has now become a common thing . Every day , you may relate to this matter . Computers and the Internet have helped your work . Ease of finding information , perform various financial transactions , store or process data into something that is not overly burdensome . However , behind the simplicity , there are a variety of threats that can damage your data or your computer either a PC or laptop .
When you find your computer is not working properly , such as computers slow , hangs , look for the missing data , display annoying when you're working , you may conclude your computer is infected with a virus . There are actually a variety of threats that target when you work with computers and the internet . These threats can corrupt data , computers , and even steal important data .
Threatening the security of not only the virus . There may be some terms you've heard but still do not know what he meant . Here's an explanation of things that could threaten your computer or take your critical data .
adware
This is a program that will display ads on the computer . Will interfere because adware generally will use the resources of the computer , the computer runs slow as a result . There are also types of adware pop - ups appear to interfere while you're working .
brute Force
An activity to break the password by combining numbers and letters in sequence . Very dangerous if with this technique , an unauthorized person managed to figure out your password then misused . To overcome this problem , it is better to use a password that is not just made up of numbers and letters but also consists of symbols such as $ , # , & , and others .
DDoS
Stands for Distributed Denial of Service , in which a server or computer is attacked by bombarded shipment data in very large measure by many computers simultaneously . As a result of the difficult to access computers or hardware damage due to not being able to accommodate very large data submissions .
exploit
That is an application that is trying to find and attack the weaknesses of the system to gain access to the system or with the intention of infecting or computer .
Fake Antivirus
It works by making the computer as if exposed to the virus and advised to buy antivirus to tackle the virus .
Hoax
That is the usual hoax spread via email or website . The effect is a panic or many readers were fooled . Another result is burdensome because the internet network of hoax chain message is being delivered to another person .
keylogger
Is one that is quite dangerous threats . Keylogger will record the input is entered via the keyboard to be stored or sent to a person who is normally used for purposes that are not good . It should be especially wary when you enter a password in public places such as cafes . Password you entered through the keyboard can be known and may be used for purposes that are not good .
One way to avoid keylogger is by using the On Screen Keyboard when I had to enter a password . On Screen Keyboard can be run from a Windows program that resides on Programs | Accessories | accessbility or by typing " osk " from Start | Run on Windows Operating System .
malware
Usually found on the bootsector on the hard drive , then change the first time the program is run . The system is usually affected first is the Operating System . Infection of the OS it easier for malware to spread themselves or spread a virus on a storage medium such as a CD ROM or Flash Disk .
phishing
Is a form of Internet fraud to get someone willing to provide important information that is not entitled to know. For example , to create a website that is similar to a bank's website . A victim does not realize she has been tricked setealh then enter a password that is known by the manufacturer can be used to drain the savings of victims .
rootkits
That is a program that aims to hide other programs running . Usually used to spread malware , viruses , or keylogger .
spam
Mean unsolicited email . Usually an email advertisement or inducement in order to become a person visiting a particular website is actually a phishing or malware to spread . Messages can be sent in large quantities so spend the time to remove it .
spyware
Is a program that serves to spy on users in order to get important information such as credit card numbers , PINs or passwords that can be detrimental to the victim due to the leaking of such information .
Trojan
Acting as if he dalah good program that can be used to help the user work . However , where there is actual harm to the system functions as a whole or to steal confidential information . Trojan easily spread to other computers .
worm
Is a malware that can copy itself and then sends the results of doubling himself over the network without having to have a specific activity performed by users. The worm can be dangerous because it can be a gateway for viruses , malware or other destructive programs .