Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

The funds protect your computer and maximum security
Категория: English version

Through the web page and e-mail (the two most popular online service) to your computer can enter the dangerous elements. From this, you will be able to defend themselves! The system must be installed reliable antivirus, which will check all files that come from the outside, the existence of malicious code. Spam can also be a source of danger for the PC (unbidden letters increasingly contain a "Trojan Horses"), so be sure to install e-mail spam filters. But you still have to be vigilant - often using simple techniques attackers forced him to carry out actions leading to contamination of the computer (for example, click on a link, said in a report to run attached file, etc.).

This may be Internet worm (self-computer program, which applies mainly to the network. Some worms enter the PC through opening an infected e-mail-message, attack other computers in automatic mode), and backdoor-virus (perform unauthorized computer management . It is usually in two parts; a small module that surreptitiously installed on the computer is beaten, and management program that installed on your PC, an attacker) and spyware (a program distributed with other programs are usually free. After the penetration of PCs, it is collection and transmission of information on the personal preferences of the user).

Web services are a new generation (Web 2.01) - with the active content - also are a threat, as well as built on the execution of Javascript-scenarios, under the guise of which can hide malicious code. It is necessary to disable Javascript in the performance properties of the browser and integrate them only when they visit the resource, which they really need to work correctly.

Program-protectors used in the network, the so-called firewalls ( "firewall"), can reflect this attack. These "protective wall" exists in two versions: in the form of programs and modules built into modern routers (a device used in computer networks decide on a route that data packets are forwarded to the addressee. Typically used to connect several segments of the network).

To secure the computer, allowing it greater safety, you should use a range of protective equipment:

1. The firewall that protects against unauthorized access to personal computer of another person. And it is on the Internet fraudsters who with the help of embedded computer programs, "vrsditeley" backdoor-like viruses, can manage to capture them and remove, alter or steal personal files. As well as the infiltration of spyware that are invisibly sent via the Internet its owners personal computer files owner.

2. Anti-Virus, which should be updated (the more the better) over the Internet. It protects against viruses, worms and other malicious programs.

3. Program, which protects against financial loss when "dialerov (programs automatically dialing phone numbers). This point is especially important if your network connection is not via DSL, and the regular dial-up-modem. A special program will recognize an attempt to dial the ISP and then block it. This function has many anti-virus programs.

4. Anti-spyware program to rid PCs of programs, parasites, collecting information on personal preferences of the owner of a computer. Firewalls can prevent the sending of spies in the Internet, but to remove themselves from pests they can not.

5. Restrict advertising to e-mail for advertising garbage (spam) is not coming to your mailbox owner's computer.

Often, many of these tools, including firewalls, combined in an integrated package of PC security (for example, Norton Internet Security and Kaspersky Internet Security).

More want to touch on security issues with e-mail, which is the most popular Internet service, leaving far behind search engines, social networks, instant messaging and IP-telephony.

"Skin me to the" soap "!" - Today the phrase sounds just as naturally as they used to "Call me!". This is not surprising: the digital letter arrives at the recipient of a few seconds after departure, even if attached to the message "heavy" files - photos, music or videos.

Through e-mail to a computer can enter attackers. Alternatively, they may try to get through the delivery of false data communications access to bank account or downloaded to your hard disk malicious program. Fraudsters are interested primarily owners of electronic purses. How to guard against such dangers and how to protect their privacy?

1. When you sign up at various forums or dating sites have to specify a valid email address. For such purposes are best suited so-called one-time address: they can be used to register and to receive a letter with the registration data. After a while, the address will be automatically removed: after a single use, it is unlikely to have handy. Create it could be two ways. a) If you need a one-time address, you can vospolovatsya postal service Spambog, which provides e-mail address looks like this: Name polzovatelya@sramog.som for a short time. Unlike conventional online mailbox Spambog work with limitations. So, read messages are stored on the server for 2 days, unread 4 days, but you can only use the address for three months. b) If necessary - to address a long time, you can use the service, which will redirect incoming messages to the "real" mailbox, for example Trashmail.net. Some sites are blocking one address. In this case, you can create an address on another server, for example, www.mailinator.com or www.temporaryinbox.com - the latter in order to circumvent the lock each time the user logs on the site automatically creates new addresses with different domain names. In addition, it enables you to create a "forward" addresses for sending letters to this mailbox.

2. Nothing annoys users, as the mountains of advertisements, thick in the mailbox. Get rid of spam is not easy, but possible, adhering to the following simple rules of behavior on the Internet:
- Inform your e-mail, not all contractors, but only to people from whom you want to receive letters;
- Points in the guest book or in the registration pa additional forums, or "throwaway" e-mail address;
- Do not answer e-mails with spam - it will only lead to an increase in the flow of advertising;
- Never click on links in promotional letters, even if they supposedly serve to unsubscribe from the list. In fact, they are intended to control your address, that is to verify, whether in fact your mailbox;
- When you open the message, some mailers are asked whether you want to download images from the Internet. To give permission for this operation should only occur if the letter received from a reliable sender;
- Use a spam filter. If in the mail client is a feature, zadeystvuyte it. Many postal services, like antivirus software, have their own spam filter;
- Regularly update email program - it would enhance protection against spam.

On the website Agnitum (www. agnitum.ru / products / spam-terrier) to get free spam filter Spam Terrier for Outlook and Outlook Express. It automatically detects in the flow of correspondence, letters advertising character, so users from having to manually browse and filter out unwanted messages. The filter is samoobuchayuschimsya. To determine which messages should be viewed them as spam, you must specify the message from an existing mail that the user finds spam. What will be thoroughly trained Spam Terrier, the more accurate the results. To deal effectively with mailings can also help Vade Retro from Goto Software (http://www.vade-retro.com/uk/desktop/). The program is available for free download and free same performs the first update of spam database. Further updating the database would cost approximately $ 40 for a yearly subscription.

3. You need to check attachments to e-mail messages. Photos, executable files with the extension exe, music, the account - all of which goes to the computer as an attachment to e-mails. But not all the attachments, is what is written in the letter: there are often hiding a virus or "Trojan". Therefore, when dealing with an attachment you need to be cautious and to observe the main rule:
- Never open an attachment in the letters from strangers;
- If the sender identifies himself as Officer of the FSB, a bank employee technical support mail server, it is almost certain to receive such a letter indicates an attempt to hacking or fraud! Better immediately delete such a message;
- Check whether all the file extension is as it seems at first glance.

For example, investing poses as a document PDF, showing corresponding increase, but in reality it may be an executable file. This is a high degree of probability points to attack your computer. To avoid possible infection need to know exactly what you received. Turn on display registered in the types of extensions. To do this, expand in the Windows Explorer Tools menu and select Folder Options, select the "View" and uncheck the box next to "Hide extensions for known file types", then click on "ok". Now the expansion of the downloaded will be shown in full.

4. Mail clients (the software running on your PC, which allows you to receive, send and organize e-mail), for example, Outlook can move suspicious e-mail messages to a special folder for spam. The user selects the level of protection against junk mail. By placing letters from the blocked senders of junk mail folder.


Статьи по теме:

Changes in the mechanism logon
Crm system, introduction Crm Systems
Working in Windows Vista
Review of Windows Vista
Bus EISA
LIBCOM-2007: new items of high technology from the company «Alee Software»
The choice of antivirus software for home computer
Time to create protection
Make backup ropii professionally - Norton Ghost 14
Routers NetGear
The Office of visualization
The development of databases on Msde 2000, working with Free Database Mssql
Computer virus
The development control information tools for PADS
«Rolling» to previous versions of Microsoft Windows
Threats to Security Modern Networks
Why is cleaning Windows registry needed
Legal and technical documents
Preventive methods that reduce fatigue while working for a computer
Document for Linux
Concentrators Fast Ethernet NetGear
On Legalization. Price Errors!
Perfect System Digital Surveillance Uniteco Dvs
Plotters DIRECT IMAGE
The truth of the activation of Windows Vista
ISA bus
Editing a sound file
METHODS OF PROTECTION FROM COMPUTER VIRUSES
The destruction of computer data
Reduced-occupied Windows XP disk space
Playing audio and video files
The process of software development, the Program for Business
Free software, whether or not to be
Windows Media Player
Black Banner - Myth or Reality?
The structure design and generation of computers
TYPES LKS
What brings Sp1 For Windows Vista?
Black Banner - or the threat of new technologies?
Active Desktop Windows XP
Nosy about the habits of your guy online?
COMPUTER CRIME PREVENTION
Geographic Information Systems (GIS) as a means of collecting and analyzing Geodannyh
Windows Vista: When ends Diskspace
Computer technology and Genealogy
Linux set in motion devices: Now in the market
Completed work on setting up a new product Alee Archive 3 for work with DBMS
Terms of the need for backup devices
Enabling Windows XP
The history of personal computers
Checking Software Licensing
Fraud Cell Phones
Download Mozilla
Electrostatic Plotters
The company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»