Recently a computer security expert said that the only way to keep a computer 100% sure that you never turn on. This is really inaccurate and misleading a bit. A team is used only for write up to and print documents, never connected to the Internet and that never received the files transferred from another team, could in fact be a system 100% sure useful equipment. Viruses and other malicious programs on a computer over a network such as transfers of files and the Internet from other teams and there are several ways that can happen.
Users wishing to connect computers to the Internet and receive e-mails, instant messages, browse web pages, download music and entertainment software, etc.. The problem is that this puts not just millions but billions of people at your door! I imagine that if billions of people could achieve a home instantly - how many intentional ill would come to see if doors and Windows are guaranteed? How many fraudsters would knock on the door? An Internet connected computer is only this predicament.
When a computer is connected to a network of design starts listens for communications from the outside world. Things known as ports are created they are special "doors" to the team. These gates are special because each of them has a designated program who will answer the door if it is called a. examples of programs who are listening to the network traffic:
-instant messaging programs
-Internet phone software
-software to connect to your computer from remote locations
-Internet games
Even the operating system itself opens ports for sharing files or a printer or anything else on your computer. Each of these programs creates a "gateway" to the team who will respond if someone "touches" in it. If the response program is badly designed program "knocking" could take advantage of it and thus endanger the team.
In addition to people able to come across Internet and calling one of the "doors" mentioned above, through a web browser and surf the Internet users are inviting people to have access to their computers. Every time that a web site is to explore the web browser is downloading files on the computer and process them. If the web browser is not programmed correctly is a huge security risk. For example on December 12, 2008 Microsoft reported a big security hole in all versions of its Internet Explorer browser. The hole allows data stealing software to install on the computer of the victim only by browsing a Web page infected! Other examples of programs that invite access to your computer:
-Email programs
-Music sharing programs (by far one of the greatest security risks) and file sharing
-Instant Messaging software
Apart from isolate to a team from the rest of the world, how can one protect a computer system? Here are some tips:
1. Do not use Internet Explorer as your main browser. I'm not attacking Microsoft or Internet Explorer especially and something must be clear: it is not necessarily that other browsers are programmed much better but that 80% of people surfing the Internet using Internet Explorer. Thus thieves interested in access to the maximum amount of victims will spend most of their efforts to exploit security holes of the browser you are using 80% of the people.
2. Put a firewall between the internal network and the Internet. It is the firewall keep away those billions of people who can be instantly to your door. It will only allow to invite those who knock on the door of his team.
3. Use a Firewall on each individual computer. The mentioned network firewall is a major step towards the protection of the internal network. The problem is that generally does not protect users of the same. A user browsing a website is saying that the firewall on the network which has given an invitation from this Web site and allow files from that site to come through. If the user browses a website infected with a browser that has a security hole you get a virus on the network. If it is some kind of virus could begin to replicate within the local network. A computer firewall defends against this type of problem.
4 Update the operating system and browsers. Security holes are constantly in all browsers and all operating systems. Software updates patch these holes.
5. Use a program antivirus and antisoftware good and updated spy. These programs help to prevent damage caused by viruses that make your system.
6. Data from backup. A secure system is impossible to 100% far from isolate to a team. If the backup of your data, then, the worst thing happen to have good backup will prevent this disaster.
The above represents the basics and much to the protection of computer systems.
To Yves. Martin Consulting, LLC. It was the first web development companies of implementation in the region of Philadelphia and the Delaware Valley to create PHP and ASP.NET based systems and content management database dynamic web sites capable of producing experiences for the exploration of individual web users. Through M-Qual brand Yves a. Martin Consulting, LLC. It continues this tradition of development of vanguard for the Web to keep constantly abreast of Web innovations and technologies, as well as strategies of Internet marketing to help clients not only has a Web presence but also use this presence effectively to achieve their objectives.
{ 0 comments... Views All / Send Comment! }
Post a Comment