Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

Google on the Internet malicious software
Категория: English version

Today, Google has published on its official website a report entitled "All your iframe are point to us", drawn up by the security Google. This report focuses connected to the fact that more than three million Web pages at 180 sites in the arrival of thousands of users automatically try to install malicious software on his computer.

Interestingly, according to Google, most of the malware is on the Chinese web servers. At one of these servers, Google has been able to locate about 21 thousands of links from other sites (and also Chinese). It must be noted that about two per cent of infected sites in theory can spread malicious software through social networks in which they are registered.

At the experts Google has not stopped, they also learned how vulnerable server software. It turned out that 38 percent of Web servers based on the Apache platform and the same percentage of plants in the language PHP (programming language used to create sites), are outdated and may be vulnerable to attacks from outside.


Статьи по теме:

Repair & servicing Windows registry
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
The company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»
IBM sends framework ACTF donated Eclipse
Systemic and local bus
General characteristics of Cybercrime
Icons in the design. Stages and stage of development of computer
Enabling Windows XP
Sugarcrm In Russia
Theft of computer data
VARIETY COMPUTER VIRUSES
Checking Software Licensing
How to choose the CRM: Develop a short-list CRM systems
Changing the design desktop
Hold printing
PC Peripherals
LASER (LED) Plotters
SWISH Max or Flash animation effects
Soa-platform Ijanet Free
The attack at Infinity Gb V2 2
Document for Linux
Planning in the operating system UNIX
Make backup ropii professionally - Norton Ghost 14
Developing databases, Inside View
Bus EISA
The most demanded software!
The choice of antivirus software for home computer
Microprocessors used in CompactPCI-systems
1C Program Office Trade 8
Backing up data. Should I pay?
Hackers, as the subjects of computer crime
"Trojan horse"
TYPES LKS
Varieties of computer crime
The possibility of CompactPCI have more than 8 slots
Local bus
METHODS OF PROTECTION FROM COMPUTER VIRUSES
Mobile Trade Optimum - Office Business Representatives
Crm, software
The processes in the operating system UNIX
Fire systems company Satel now can be controlled by phone or Ethernet
Why work for a computer is harmful to human health
LIBCOM-2007: new items of high technology from the company «Alee Software»
Technical approaches to increase the security of the computer
Installing Systems Videonablyudeniya In Office
VISA-2000. Virtual seller of computer equipment
What is the codec and where they can be downloaded
Pen plotters (PP, PEN PLOTTER)
Terms of the need for backup devices
Restoring Windows
Tips software and programs connected branch
The signals under UNIX
3Ds Max 2008 (Rip)
MAINTENANCE AND spread of computer viruses
Computer virus