Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

Malware: What you need protection from




Security Software

This category includesa number of different kinds of programs, all of which are trying to protect your computer and your data from attacks and damage and being controlled without permission. No one program can protect against all of the bad guys out there. Using a set of overlapping programs is the best way to keep your computer and its data safe. Malware is what we call the whole category of things that try to do bad things to your computer or your data.

  • Viruses copy themselves to other disks to spread to other computers. They can be merely annoying or they can be vastly destructive to your files.
  • Trojans hide inside something else to sneak in unwanted programs. You don't know that they are there, like the famous Trojan horse. These are often used to capture your logins and passwords.
  • Worms are unwanted programs that are transferred over network or Internet connections to spread themselves quickly.
  • Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else.
  • Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities.
  • Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing information like your social security number or bank account information or logon and password for a web site. The message may claim that if you do not click on the link in the message and log onto a financial web site that your account will be blocked, or some other disaster.
  • Spam is email that you did not request and do not want. One person's spam is another's useful newsletter or sale ad. Spam is a common way to spread viruses, trojans, and the like.
  • Browser hijacking occurs when one of the nasties takes control of your browser, sending you to sites that you did not mean to go to. This may be a porn site or it may look like a real banking, sales, or credit card site. The purpose is to steal your personal and financial information or to run up the number of page views for ads on the page so that the advertisers will pay them more money.

Programs that add protection:

Anti-virus programs monitor the computer for the activity of viruses and similar nasties.

Anti-spyware programs similarly monitor your computer, looking for known trouble-makers as well as suspicious behavior.

Anti-spam software tries to identify useless or dangerous messages for you.

A firewall blocks attempts to access your files over a network or internet connection. Your network router or modem or both may have a hardware firewall built into it. That will block incoming attacks. But you still need a software firewall on your computer to block outgoing attacks. Your computer can become infected through shared disks or even from another computer on the network. So you need to monitor what your computer is putting out over the network or internet also.




Поделиться с друзьями:


Дата добавления: 2014-12-23; Просмотров: 475; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.008 сек.