Social Icons


Monday, August 15, 2011

Security, Malware, And Your Computer

Defined as a threat to computer security is intentional, it is criminal in nature or the  call a computer crime. Another relative of cybercrime is cybercrime. The FBI s  of particular interest to cybercrime and the proximity of other types of crime associated with them, such as  industrial espionage, l  computer activity, l  ethics, cyber-terrorism, hacking, cracking and cyberextortion.

Hacking at the same time a positive for him, but were introduced as computer crime, falls into the bucket with the rest of  them. The hacker is a person who accesses a computer illegally profit. Sometimes, use the  excuses that  they just try to netwerk, known for the manager who break safety deficiencies.
Closely related to the context, a hacker-cracker. But l  striker n  has never been seen in a positive light. L  striker has always l  for your computer and  network access to do him harm or commit a crime to steal information stored on them. L  attacker, because the  attacker must know what  he or she advanced computer skills needed to remove these crimes.

Then there  s cyber-terrorists and cyberextortionists. The cyber terrorist has a political motive behind their actions and do damage to a system politiek d  influence of computers. Cyber terrorism requires much planning, qualified staff for the  run, and l  money to finance it. It is similar to  conventional attack of terrorism.

Cyberextortionist is the one who commits the crime  extortion by email. They hold hostage and threatened the community of confidential business data or damage the computers of  a network  company, and s  they are not certain confidential information and / or s  money. Exposed Sometimes these criminals are aware of the vulnerability they can find on your computer. It is similar to the  extortion carried out by means other than classical computers.
Then there is the employee who wants revenge for his company because of  a perceived injustice to them, or that  they want their way pockets. These people are bekend for their employees, unethical, and what makes them so dangerous that  they often know how to get into the system.

Not everyone has the necessary computer skills for a cracker or a pirate, so that d  a classification different from the  known script kiddie. This person is usually a teenager trying to computersysteem harmful, but can not do much because that  he or she does not know much. This person will try to keep the program  programs and scripts, hacks and cracks to use.

Some companies are trying to be contrary to the  ethics oneerlijk competitive advantage through illegal activities such as  industrial espionage to obtain. The same companies contrary to  ethics d  firm  hire a spy who is well versed in computers and computer technology will penetrate the target company. L  spy d  company, or even steal information or sabotage of  target computer.

It is imperative that home and business to protect your computer against these threats to their security. Methods of security are not 100% sure, but they greatly reduce the risk  computers. Once that  a solution is found to protect against a threat that someone  one is a new way  gain unauthorized access to them to be discovered. The users  computers in home networks are at greater risk of  any computers in the network data  company, stolen mainly due to the most advanced security. And  Internet is a network is still fragile and in danger when he s  acts of security. Another problem with Internet security is a central point for managing security on the  superhighway  information.

You   probably wondering now if your computer against threats of this kind. There are many ways that your system can be evaluated. Here are sites that offer services, l  access to your computer and found you informed of all security breaches while surfing the Internet or e-mail will provide. These companies often offer advice and suggestions on ways to protect against vulnerabilities. Another source in the fight against the threat of computer security is the Computer Emergency Response Team (CERT) Coordination Center, as well as suggestions.

An offshoot of the computer virus is a worm. A computer worm is similar to a virus, except that  it   be some perfectly valid executable program on your computer and a connection with this program available. When the user program, the  worm attack computer is running. The worms can consume network bandwidth when they replicate via a network  company.

And now threatens the Trojan horse that celebrates  computer got its name from the famous tale from Greek mythology. What is a Trojan horse is a program that looks like a valid program to hide, but in reality it n  not. Trojans do not reproduce like viruses and worms do.
All these different types of software such as malware, a term used to program malware   s reference used is known. Malware, as its name  suggests, causes damage to your computer. There are d  other variants of worms, viruses and Trojans, but we  again only three for this article. And you must know how the suspects were attacked by one or more of these malicious programs  s. You have to suspect, were attacked when your computer has one or more of the following:

Program Files  s you use, not suddenly as d  usual:

• Files are missing or damaged
• listen to music or sounds on your computer
• You are running out of memory for no apparent reason
• strangers in your file system
• System properties begin to change
• Pop-ups with strange messages and / or  display
You can use the  one of the following ways in which these malware  s no damage or devaluation of their  ;, pumps 
• A user runs a program infected with the virus. Therefore, anti-virus software to use a program that is so important  be verified.
• L  the user starts  computer and the virus is installed in the boot sector. It is recommended that all media files in the  stop.
• A user connects to a computer that n  is not protected against viruses on the network (such as  access to a shared drive). Then open the  user receives a virus infected file on a shared drive, and now the client-user  a computer virus.
• A user opens an e-mail that  an executable file with a virus. It  is why it is so important, no attachments to e-mail open executable because you know the  sender and the site was scanned by an antivirus.

And another big problem with the malicious code is that new means of implementation are found each day. Web Site Security try to stay on the implementation of any new malware, so users are aware. Take basic safety precautions to protect your computer, such as  installation  a good anti-virus software that is automatically updated with new malware detection logic. Never open attachments in suspicious emails. Beware of sites to visit before you (do not visit warez sites), an anti-spyware. The average of all other boot devices that you have a virus that is not stored in the boats are launched and have. Finally, information on sites for the latest security threats and what  you have to look for  accommodation

No comments:

Post a Comment