Ads 468x60px

.

You Should Know About Computer Viruses

 
When you find your computer is not working properly, such as computers slow, hangs, look for missing data, display annoying when you're working, you may conclude your computer a virus. Actually there are various threats that target when you work with computers and the Internet. These threats can damage data, computers, and even steal important data.


Pengancam security of not only the virus. Maybe there are some terms you've ever heard but still do not know what he meant. Here's an explanation of the things that can threaten your computer or take your important data.


Adware


This is a program that will display ads on the computer. It would be disturbing because adware generally will use the resources of the computer, as a result computer is running slow. There is also a type of adware that appear in pop-ups that can interfere when you're working.

 
Brute Force

An activity to break the password by combining numbers and letters in sequence. Very dangerous if with this technique, people who are not entitled to succeed to know your password and then misused. To overcome this problem, it's good password that is used not only consist of numbers and letters but also consists of symbols like $, #, &, and others.

DDoS


Is a continuation of a Distributed Denial of Service, where a server or computer is attacked with bombarded shipment data in a very large size of many computers simultaneously. As a result the computer is difficult to access or damage to hardware not being able to accommodate very large data items.


Exploit


That is an application that tries to find and attack the weaknesses of the system to gain access to or for the purpose of infecting the system or computer.


Fake Antivirus


The way it works is by making as if a computer virus and suggest to buy anti-virus to overcome the virus.


Hoax


That is plain hoax spread through email or website. The effect is a panic or a lot of readers who were deceived. Another result is burdensome because of the Internet network of hoax chain messages are delivered to another person.


Keylogger


It is one threat that is dangerous. Keylogger will record that entered through the keyboard input to be stored or sent to someone who normally used for purposes that are not good. This is in particular to watch out for when you enter the password in public places like cafes. Password that you entered via the keyboard can be known and may be used for purposes that are not good.


One way to avoid a keylogger is to use On Screen Keyboard now must enter the password. On Screen Keyboard can be run from the Windows programs that are on Programs | Accessories | Accessbility or by typing in "OSK" from Start | Run on Windows Operating System.


Malware


Usually found on the bootsector on the disk, then change the course of the first run. Systems that are usually affected first is the Operating System. Infections in Operating System makes it easier malware to spread themselves or spread the virus on storage media such as CD ROM or Flash Disk.


Phishing


Is a form of fraud on the internet by making someone would provide important information that is not entitled to know. For example, by creating a website similar to a bank website. A victim does not realize he had been deceived and then enter the password that setealh known by the manufacturer can be used to deplete savings victim.


Rootkit


That is a program that aims to hide other programs running. Usually used to spread malware, virus, or keylogger.

Spam


Mean an unexpected email. Usually an email advertisement or a teaser for a person visiting a particular website which is actually a phishing or to disseminate malware. Messages can be sent in large quantities, so spend time to remove them.


Spyware


Is a program that works to spy on users with the purpose of obtaining critical information such as credit card numbers, PINs or passwords that can harm the victim because the leaking of such information.


Trojan


Acting as if he dalah good program that can be used to help users work. But, actually in it there are functions that endanger the overall system or to steal confidential information. Trojans easily spread to other computers.


Worm


Is malware that can multiply and then sends copies itself over a network without having a specific activity performed by users. The worm can be dangerous because it can become an entry point for viruses, malware or other destructive programs

Don't Miss Another Post. Free Updates Like Us

Share this Article

Enter Your Email For Updates

Labels

Adsense (1) Automatic Backlink (11) b (1) Backlink (9) Blog beginners (134) blog designing (138) blog site (3) blog spot (1) Blog Templates Download (15) blog Tips and Tutorials (1) Blogger blog (4) Blogger help (4) Blogger Templates (1) Blogger tips (3) Blogger tutorial (5) Blogging Software (1) blogging tips and tricks (149) Blogging Tips and tutorials (156) Blogging Tools (131) Blogging widgets (101) Codes and scripts (72) Computer news and updates (31) Directorys (8) Ebooks (1) f (1) Facebook (16) Facebook And Blogger (1) Faceobook (1) Farmville (1) File hositng and sharing (2) Fonts and Images (1) Forums (1) Free online services (28) Freewares (34) Gadets (13) Games (3) Google (22) google blogs (3) how 2 start a blog (3) How do I Start a Blog (5) How do i start a blog for free (12) How do you start a blog (7) how to blog (1) How to Get Started Blogging for Yourself (1) how to start a blog (4) How to start a blog for free (3) How To Start A Free Blog (1) how to start blogging (1) how to write a blog (1) i pad (4) Internet (43) Internet money making tips and tutorials (7) make a free blog (1) Make a free blogger blog (2) make a free bloghow do i start a blog for free (1) make blog (1) make your own blog (1) Make your own web site (2) Make your own website free (7) Mobile (4) Photoshop plugins and tutorials (2) rss (3) Search engine optimization (52) Seo (55) Seo blogger (5) softwares (24) start a blog (4) start a blog how to (1) Start a blog Tips (1) start blog (6) start my own blog (1) start your own blog (4) Start your own blog free (2) starting a blog (5) starting a blog for free (2) Tips and Triks (58) Tips to Start Blogging Successfully (1) Twitter (4) updates (1) web designing (10) websites (1) Windows Tips and Triks (22) Wordpress (1) You tube (1)