Search

Thursday, June 23, 2011

kinds of threats would undermine or interfere your computer through the internet

When you find your computer is not working properly, such as computers slow, hangs, look for missing data, display annoying when you're working, you may conclude your computer is exposed to the virus. Actually there are various threats that target when you work with computers and the Internet. These threats can damage data, computers, and even steal vital data.

kinds of threats would undermine or interfere your computer through the internet


Threatening the security of not only the virus. Maybe there are some terms you've heard but still do not know what he meant. Here's an explanation of things that can threaten your computer or take your important data.

Adware
This is a program that will display advertisements on the computer. Because it would interfere with the adware will generally use the resources of the computer, resulting in a slow running computer. There is also a type of adware that appear in pop-ups that can interfere when you're working.


Brute Force
An activity to break the password that combines numbers and letters in sequence. Very dangerous if with this technique, an unauthorized person managed to find out your password and then misused. To overcome this problem, it's good password is used not only consist of numbers and letters but also consists of symbols like $, #, &, and others.

DDoS
Is a continuation of Distributed Denial of Service, where a server or computer being attacked by bombarded shipment data in a very large size of many computers simultaneously. As a result the computer is difficult to access or damage to the hardware not being able to accommodate very large data items.

Exploit
That is an application that sought to locate and attack the weaknesses of the system to gain access or with the aim of infecting the system or computer.


Fake Antivirus
The way it works is to make it look like a computer virus and suggest to buy anti-virus to overcome the virus.


Hoax
That is the usual false news spread by email or website. The effect is to panic or many readers are fooled. Another result is burdensome because of the Internet network chain of the hoax message is communicated to others.


Keylogger
Is one which is quite dangerous threat. Keylogger will record that entered through the keyboard input to be stored or sent to someone who normally used for purposes that are not good. This should be especially wary if you enter a password at public places like cafes. Password that you entered through the keyboard can be known and may be used for purposes that are not good.

One way to avoid keyloggers is to use On Screen Keyboard now have to input the password. On Screen Keyboard can be run from a Windows program that is on Programs | Accessories | Accessbility or by typing in "OSK" from Start | Run on Windows Operating System.


Malware
Usually found on the bootsector on the disk, then change the program that was first run. The system is usually affected first is the Operating System. Infection in the Operating System makes it easy to spread malware themselves or spread the virus on storage media such as CD ROM or Flash Disk.


Phishing
Is a form of fraud on the internet to make someone want to give important information that is not entitled to know. For example, by creating a website similar to a bank website. A victim does not realize he had been duped and then enter the password that setealh known by the manufacturer can be used to drain the victim's savings.


Rootkits
That is a program which aims to hide other programs running. Commonly used to spread malware, virus, or keylogger.


Spam
Mean an unexpected email. Usually an email or a teaser ad for a person visiting a particular website which is actually a phishing or malware to spread. Messages can be sent in large quantities so spend time to remove it.


Spyware
Is a program whose function is to spy on users in order to get important information like credit card numbers, PINs or passwords that can harm the victim because the leaking of such information.


Trojan
Acting as if it is good program that can be used to help the user work. But, actually in it there are functions that harm the overall system or to steal confidential information. Trojans easily spread to other computers.


Worm
Is malware that can multiply and then sends copies itself over a network without having any particular activity performed by users. The worm can be dangerous because it can be an entrance for viruses, malware or other destructive programs.