Computers and Internet Threats
When you find your computer is not working properly, for example, computer is slow, hangs, look for missing data, display annoying when you're working, you work with your computer finds a computer virus, actually there are many threats that target when you are working with a computer and the Internet, following an explanation of things that can interfere with the computer or take your critical data.
This is a program that will display advertisements on the computer. Will interfere because adware usually will use the resources of the computer, the result will be a slow computer.
• Brute Force
An activity to break the password by combining letters and numbers in sequence. Very dangerous if the technique is an unauthorized person, managed to find out your password and then misused.
An extension of the Distributed Denial of Service. Where a server or computer diserabng bombarded by a large shipment of data by multiple computers simultaneously. As a result, computers are difficult to access.
That is a software that tried to find and attack the weaknesses of the system to gain access or with the aim of infecting systems or computer.
• Fake Antivirus
It works by making as if the computer infected with the virus and suggested to buy anti-virus to overcome the virus.
That is the usual hoax spread through email or website. The effect is a panic or a lot of readers are deceived.
Is one threat that is quite dangerous, Keylogger will record the input is entered via the keyboard to be stored or sent to someone who normally used for purposes that are not good.
Bootsector is usually located on the hard drive, then change the program first starts. The systems usually affected first is the operating system
Is a form of fraud on the intenet to get someone willing to provide important information that is not entitled to know. For example, to create a website similar to a bank website
Program that is aimed at hiding the other programs running. Commonly used to spread malware, virus or keylogger
Mean unexpected email, usually an email or inducement to a person visiting the website is actually a phishing tertentuyang or to spread a malware.
That is program that serves to spy on users in order to get an important information like credit card numbers, PIN, or password
Act as if he is a good program that can be used to help the user work. But, in fact in which there is a dangerous system function
Is the malware that can replicate itself and send copies over the network without having to have certain activities performed by users. The worm can be dangerous because it could be entry points for viruses