mardi 15 janvier 2013

5 golden rules for safe surfing on the Internet




To protect ourselves against the risks of loss of our accounts or our tellers when our skimming penetration of the Internet we must we take several rules for these recent protection aimed to provide us protection for our debt, the person is compromised simply did not respect rules of protection, this does not mean that the hack also not catch up with those who follow the rules of protection but in pursuing them is protecting us from the children of these people any intruders do not have knowledge in the field of intrusion but only transfer and use of programs Manufactured in advance to facilitate penetration.
Unfortunately the number of hao'laa children in constant particularly among groups ziad adolescence, to the psychological factors of adolescent role in love making victims and a sense of power and seeking worldwide and realistic,
In this article laihmna study of psychological factors to the hacker and the motives behind his penetrations personality in this requirement is to highlight the 5 basic rules protect you from intrusion

Flash effects

There are many site containing both ads Flash effects, Flash signatures are in fact not all effects are peaceful by the slenderest of ad-driven or screwed to the attention of the visitor to the extent that there are influences that contains maloers and troganat causing vandalism or computer breakthrough which must pay attention to especially with unconventional sites, and refer you to where we link to gravity Flash effects and how to protect yourself, click here for more information

Shortcut links

Serious things which exist in the social media sites in particular, Facebook is the shortcut links the attacker they make triumph over adoption to this trick with the objective of conveying to the user and make it click on the link the latter my dad don't be or become clear with good tide carries behind it might be Trojan or maloer or something like that, so the user discovers that it has been compromised. Contrary to what we said you can watch a hardcore protection, which we have already talked about the danger of shortcut links carefully and in depth about how to protect against this attack you can continue from here

Download programs

Fundamental and important point the download programs especially those that reside in informal sites such as forums, especially the majority of the attackers are to integrate the software with computer hacking programs or maloers to either your penetration or sabotage your computer in the long run, not to us, as well as near the alert to non-free software which displays with dredges or keygen. my brother my sister used back hoes and user programs incl 80% of them contain troganat there is nothing free in online world everything already bmakobl, I You pakrac and became free but in return your computer is by software viruses or Trojan or botnet ...

Beware of search engines

Search engines and a friend sometimes become enemy and perhaps the clearest example is what we came him in this picture, and you search for Norton software protection with site search displays a set of results including fraudulent phishing sites selling non-indigenous programmes and contain malicious programs that this attacker they will pinch your computer is your pocket. Hatha programs others native to the truth after that acquired by the user on the basis of real software will it cost my dad tool to the site and the program itself a Trojan program or maloer.



PDF documents

The way the attacker either hacked your computer through some Abayat codes that are merged with the specified type of documents and my dad can do reverse connection to your computer if you open this type of document from anonymous, not only can also contain maloers virus threaten the integrity of your

These rules mentioned are not exclusive rules there are a range of other rules we felt most notably said about Internet browsing activity.

0 commentaires:

Enregistrer un commentaire