Experience identify and prevent threats from Internet

Tuesday, 28 May 20130 Comment

The environmental hazard from the current web are malicious programs such as spyware (spyware), adware (adware), trojan horse (the application is), bot, computer virus or worm ... These programs are installed on your computer, tablet, smartphone that you do not know or do not have permission of the user. The threat to use the web to spread environment, constantly updating itself to "adapt" to the environment hiding and send the stolen data to the employer is the criminal network. Of course, all of these activities are anonymous malicious code on a user computer and hard to detect. Additionally, we can coordinate with each other to accomplish their goals, such as a Trojan after entering the device, you can download spyware or virus to start infection on the area large botnet system.

Want to avoid the danger of being used for equipment, information, personal data, the first thing the user must know the types of malicious programs. Because the majority of current computer users and mobile devices are the dangers from the Internet ... virus.
Identify malicious programs
Here are some common malicious programs currently being distributed on the Internet:
Malware: Software programs secretly placed on a user's computer and perform unauthorized actions, and not harmful to the expectations of the employer.
Virus: This type of computer program that can create duplicates of it, just like the real virus, they spread very quickly. Viruses are created to cause damage to equipment, display messages and images do not expect or even can destroy files, reformat (reformat) your hard drive data loss . Some viruses have the ability to take up space and memory storage device that you (especially computer or smartphone using Android) becomes more sluggish.
Worms (worms): A self-contained program can spread copies of itself to other computer systems through network connections, data attachments in email, instant messages (via the file sharing) and by working with other malicious software. Worms can block access to certain websites or stolen licenses for the applications you have installed on your computer or smartphone.
Trojan Horse : This is a program that performs malicious actions, but not able to duplicate. It can penetrate into your computer as a harmless file or application that hide malicious code, but when it is executed, the system will meet the sometimes dangerous and the user will lose the information stored on the computer.
Spam: This class is designed for the purpose of making money for the sender, device users have encountered trouble with a lot of offensive messages from email or text message.
Phishing: This is the program scam, sham designed to look like a legitimate purpose.We will seek access to phone, email, fax messages or to steal personal information and bank account.
The trick users into phone recharge on a fake website.
The trick users into phone recharge on a fake website.
Pharming: Created to be able to take control of one or more web pages and redirect users access to a fake website designed to look like real page. The fake website will secretly gather personal information to serve bad purposes.
Spyware : A spyware is installed or executed on the computer that you do not know to track, monitor and report back to the employer. It is usually installed on your computer through Trojan or as a legitimate piece of software that you choose to download and install. Spyware collects information to track keystrokes to obtain login information (keylogger), screen capture periodically to gather information (Screen capture) and track usage behavior (event logger) .
Adware: Software for advertising through pop-up windows or manually turn web pages without the user's permission.
Bot and Botnet : This is a small program that secretly placed on your computer via Trojans. A crime "botmaster" can control the bot at all times from the control center to distribute spam, the island hienlua or Denial of Service (DoS).
Ransomware: document encryption software for blackmail purposes. The encrypted document until victims purchase a decryption key or by sending payment via a third party, such as PayPal or purchase a product online with a receipt including the unlock code.
A warning on the infected computer ransomware.
A warning on the infected computer ransomware: "To unlock, you have to pay 200 USD."
These tips for Internet safety
First of all, you should install a security app on your device and make sure it is updated regularly. The use of the program dedicated to protecting Internet safety equipment such as Trend Micro Titanium Internet Security (download here ) or Avira Internet Security (download at here ).
Lets run security software to protect the continuous web surfing and downloading files on the device. In addition, users should use the latest technologies, such as Web Reputation, help to measure the reliability and safety of a site before accessing it, or Web reputation technology combined with URL filtering scanning technology and current content.
The use of the latest web technologies and browsers updated immediately when patches. Using the web browser without plug-ins Script.
If you are using Windows operating system, you should turn on Automatic Updates and the latest update patch. Also, you should always install, update, turn firewall (firewall) to stop the illegal intrusion and protect devices from malware and spyware.
Prevent malware infection via email
You should turn on spam filtering in your email account, if necessary, can create filters to eliminate spam "sophisticated" that even auto mode filter was not found.
If you get too many spam serious content, you should report any suspicious emails to the competent authorities for handling and preventing them.
Should be exploited to spam filtering features of email services.
Should be exploited to spam filtering features of email services.
So scan the attachment is downloaded from the email by the protection program before opening them. If you receive the web address, you should copy and re-enter in the address bar rather than clicking directly to open.
If you send an email request detailed personal accounts, banking, although you absolutely do not send any reason. Normally banks almost never ask you to send account details via email. For example, if you receive an email asking you enter bank account to receive the reward they learn skills and do not rush to offer.
Other Considerations
Using Web Reputation Services to ensure that the web page you visit is safe with hazards.  Be careful of sites that require software installation. Scans all programs downloaded from the Internet with the security software updated.
The service safety inspection of the site will help you to access more secure when surfing the web.
The service safety inspection of the site will help you to access more secure when surfing the web.
Always read the terms of use for the user and cancel the installation process if the program is to install unwanted programs. Only provide personal information on a web page that displays the lock icon in the address bar of your browser.
you only trade with sites that support SSL / TLS on the web (eg web sites prefix HTTPS :/ / instead of HTTP :/ /).
You just made deals with web pages that support SSL / TLS on the web, such as web sites prefix HTTPS :/ / instead of HTTP :/ /.
Press G if post useful! Thank

Bookmark:

Post a Comment

Message from admin:
Thank you for your interest in our article.
We will proceed to consider and answer your questions
---Android Software Development Team---

 
Beatstechnology Copyright 2014: Tech-Zoom.com - Digital Technology - All Rights Reserved