The computer has now become a common thing. Every day, you may be associated with this object. Computers and the Internet have helped your work. Ease of finding information, conducting a variety of financial transactions, store or process data into something that is not too burdensome. But behind its simplicity, there are many threats that can damage your data or your computer either a PC or laptop.
When you find your computer is not working properly, such as computers slow, hangs, look for missing data, display annoying when you’re working, you may conclude your computer is exposed to the virus. Actually there are a variety of threats that target when you work with computers and the internet. These threats can damage data, computers, and even steal important data.
Threatening the security of not only the virus. Maybe there are some terms you’ve heard but still do not know what he meant. Here’s an explanation of things that can threaten your computer or take your critical data.
This is a program that will display advertisements on the computer. Will interfere because adware usually will use the resources of the computer, resulting in a slow running computer. There are also types of adware which appears in a pop-up that can be annoying when you’re working.
An activity to break the password by combining letters and numbers in sequence. Very dangerous when using this technique, an unauthorized person managed to find out your password and then misused. To overcome this problem, it is better to use a password that does not only consist of letters and numbers but also consists of a symbol such as $, #, &, and others.
An extension of the Distributed Denial of Service, where a server or the computer is hit attack with a data item in a very large size of many computers simultaneously. As a result, the computer is difficult to access or damage to hardware not being able to accommodate very large data submissions.
That is an application that tried to find and attack the weaknesses of the system to gain access or with the aim of infecting systems or computers.
It works by making as if hit by computer virus, and suggested to buy antivirus to overcome the virus.
That is the usual hoax spread through email or website. The effect is a panic or a lot of readers are deceived. Another result is a damning chain of internet because of the hoax message was delivered to another person.
Is one threat that is quite dangerous. Keylogger will record keyboard input is entered through to be stored or sent to someone who normally used for purposes that are not good. This should be especially wary if you enter a password at public places like cafes. Password that you entered through the keyboard can be known and may be used for purposes that are not good.
One way to avoid a keylogger is to use the On Screen Keyboard when I had to enter a password. On Screen Keyboard can be run from a Windows program that is in Programs | Accessories | Accessbility or by typing “OSK” from the Start | Run on Windows Operating System.
Bootsector is usually located on the hard drive, then change the program first starts. The systems typically affected first are the Operating System. Infection in Operating System makes it easy for malware to spread the virus to spread itself or on storage media such as CD ROM or Flash Disk.
Is a form of fraud on the internet to make someone want to give important information that is not entitled to know. For example, to create a website similar to a bank website. A victim does not realize he had been deceived setealh then enter a password that is known by the manufacturer can be used to drain the savings of victims.
Program that is aimed at hiding the other programs running. Commonly used to spread malware, virus, or a keylogger.
Mean an unexpected email. Typically an email or a teaser ad for someone to visit a particular website is actually a phishing or malware to spread. Messages can be sent in large quantities, so spend the time to remove it.
Is a program that serves to spy on users in order to get important information like credit card numbers, PIN or password which can be detrimental to the victim due to the leaking of such information.
Act as if he dalah good program that can be used to help the user work. But, in fact in which there are functions that endanger the overall system or to steal confidential information. Trojan is easily spread to other computers.
Is the malware that can replicate itself and send copies over the network without having a specific activity performed by users. The worm can be dangerous because it could be entry points for viruses, malware or other destructive programs.