Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

Hackers can control a PC without the knowledge of their owners
Категория: English version

More and more ordinary computer users attacked dangerous viruses, and even the owners are unaware of this. This is the case, since Kandeys Lokler (Candace Locklear) a couple of weeks ago. She quietly worked in the office when her computer suddenly «get into a wax» and began to send letters to viruses all her colleagues. While she understood what did happen, several of its employees opened dangerous mail, by infecting their computers. To resolve the issue lasted 8 hours. The woman said that nothing pointed to the dangerous list, which makes it the computer itself. It is not certain that her car completely clean.

Such cases - are not uncommon. Computer security experts say that tens of millions of PCs infected with viruses, and their users about it does not even suspect. Some harmful programs record every stroke of the keyboard keys, and then transmit valuable information such as data bank accounts, passwords and credit card numbers, hackers. Others turn PCs into «zombie», literally passing the criminals have complete control over them. «Zombie» can act as servers that send thousands of spam messages, as the owner of the machine does not even suspect. Hackers can remotely change the text and sent to the volume of information.

Such an attack has recently undergone a company Monster Worldwide Inc., When about a month ago, millions of applikantov confidential information was stolen by criminals using «zombies».

Experts warn that such attacks difficult to capture, and the company together with the users must be vigilant, but have said that the situation with hackers - more than the worse. Nevertheless, it is necessary to adhere to basic safety rules, for example, to install the latest versions of antivirus software, which can be downloaded online, and protect their files this way.


Статьи по теме:

General characteristics of Cybercrime
At the market goes cheap GSM / GPS signaling
Care home PC
Integration Ibm Rational Clearquest and Microsoft Project - The key to successful planning
What brings Sp1 For Windows Vista?
Components, Modules, mamboty in CMS Joomla
The funds protect your computer and maximum security
Desperate to know if he lies or fake?
Development of Iron Industry Or Who Wanted Now Multi Processors
WAYS OF COMPUTER CRIMES
Google on the Internet malicious software
Greedy cabinet creators Spyware is testing!
Soa-platform Ijanet Free
Maintenance of computers in the Framework for IT outsourcing
Data protection. Luxury or means of survival?
Basics With Virtualdub
Hide your important documents, a computer in seconds
Animation on your computer desk
Tips and Tricks - Picasa will
Threats to Security Modern Networks
It is fake?
Linux set in motion devices: Now in the market
METHODS OF PROTECTION FROM COMPUTER VIRUSES
Enabling Windows Vista
Repair permissions for sluggish computer
Lock down the personal information on your computer
Switches NetGear
The story of software Escrow
Active Desktop Windows XP
Mikrokontrolleryne System
The total points in the organization LAN
Changing the design desktop
Development of Software Development Projects
The company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»
What your child is doing online?
Increases user rights
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
Memory management Freebsd
Download Mozilla
Ms Word Vs Notepad
What is the standard CompactPCI?
Mobile Trade Optimum - Office Business Representatives
Concentrators Fast Ethernet NetGear
Best Antivirus
PC Peripherals
Integration modules PADS in the enterprise software environment
Black Banner - History of discovery
More WinRAR 3.70 RU Final
Terms of the need for backup devices
Fraud Cell Phones
Black Banner - or the threat of new technologies?
Local bus
The destruction of computer data
The development of databases on Msde 2000, working with Free Database Mssql
Computer data as an object of criminal assault