wind jordan 5 Antivirus Internet Security Basics

 
Napisz nowy temat   Odpowiedz do tematu    Forum Naukowe Koło Chemików Uniwersytetu Gdańskiego Strona Główna -> Imprezy naukowe
Zobacz poprzedni temat :: Zobacz następny temat  
Autor Wiadomość
yan6d3b7
Einstein



Dołączył: 30 Mar 2011
Posty: 99
Przeczytał: 0 tematów

Ostrzeżeń: 0/5
Skąd: England

PostWysłany: Sob 2:21, 21 Maj 2011    Temat postu: wind jordan 5 Antivirus Internet Security Basics

,[link widoczny dla zalogowanych]
rs ambition to splice computers to the Internet and receive emails,[link widoczny dla zalogowanych],[link widoczny dla zalogowanych], instant messages,[link widoczny dla zalogowanych], browse web pages, download music and amusement software etc. The problem is that this puts not just millions but billions of people at their doorstep! Imagine that if billions of people could reach a family directly - how many ill intentioned people would come by to penetrate if the doors and skylights were secured? How numerous con talents would knock on the door? An Internet connected computer is in just that predicament.
When a computer is chained to a network along design it starts listening for communications from the appearance world. Things known for ports get created which are special "doors" to the computer. These doors are special for they every have a designated program that will answer the door if it is knocked on. Examples of programs that hear for traffic from the network include:
・ immediate messaging programs
・ Internet call software
・ software for connecting to the computer from remote locations
・ Internet games
Even the operating system itself opens ports to share files or a printer or anything else ashore the calculator. Each of those programs creates a "door" to the computer namely it ambition answer whether someone "knocks" on it. If the answering procedure is poorly charted then the "knocking" procedure could take advantage of it and thus concession the computer.
In adding to people creature skillful to come along the Internet and knock on one of the "doors" mentioned on - by using a web browser and surfing the Internet users are inviting people to access their computers. Every time a web site is browsed the web browser is downloading files to the computer and processing them. If that web browser is no programmed properly it is a huge security risk. For sample on December 12 of 2008 Microsoft reported a huge security hole in all versions of its Internet Explorer browser. The hole permitted data embezzling software to be installed on the victim's computer just by browsing an infected web page,[link widoczny dla zalogowanych]! Other examples of programs that invite access to your computer:
・ Email programs
・ File sharing and music sharing programs (by far one of the largest security risks)
・ Instant messaging software
So alongside from isolating a computer from the outside world,[link widoczny dla zalogowanych], how can one defend a computer system? Here are some tips:
1. Don't use Internet Explorer as your main browser. I am not bashing Microsoft or Internet Explorer especially and something ought be made clear: It is not necessarily that additional browsers are programmed so many better merely that 80% of people surfing the Internet are using Internet Explorer. Thus thieves interested in acquiring access to the most measure of martyrs are working to spend maximum of their efforts exploiting the security holes of the browser that 80% of the people are using.
2. Put a firewall among your interior network and the Internet. A firewall's job is to keep out those billions of human who tin be at your doorstep instantaneously. It will only allow those you invite to knock on your computer's door.
3. Use a Firewall on each individual computer. The network firewall mentioned above is a big tread toward protecting the internal network. The problem is that it generally won't protect users from themselves. A user browsing a website is differentiating the network firewall that it has given an invitation to that website and to permit files from that site to come through. If the user browses an infected website with a browser that has a security hole a virus will get into the network. If it is a decisive type of virus it could begin replicating itself within the regional network. A computer firewall defends against this sort of problem.
4. Update your operating system and browsers. Security chasms are often base in entire operating systems and all browsers. Software updates patch these holes.
5. Use a agreeable and up-to-date antivirus and spyware progr


Post został pochwalony 0 razy
Powrót do góry
Zobacz profil autora
Wyświetl posty z ostatnich:   
Napisz nowy temat   Odpowiedz do tematu    Forum Naukowe Koło Chemików Uniwersytetu Gdańskiego Strona Główna -> Imprezy naukowe Wszystkie czasy w strefie EET (Europa)
Strona 1 z 1

 
Skocz do:  
Możesz pisać nowe tematy
Możesz odpowiadać w tematach
Nie możesz zmieniać swoich postów
Nie możesz usuwać swoich postów
Nie możesz głosować w ankietach


Bluetab template design by FF8Jake of FFD
fora.pl - załóż własne forum dyskusyjne za darmo
Powered by phpBB © 2001, 2002 phpBB Group
Regulamin