Wednesday, February 4, 2009

The threat of online security.How safe is our data?




There are still a lot of threat via internet which is not a safe place for you to keep the data unless you really have sufficient protection software, such as anti-virus,kaspersky to against the varieties of threats until right now. There many types of threats, for example, spyware, Trojan, Malware, worms, viruses.

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software viruses or as the result of installing a new program.

A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.


A destructive program that masquerades as a benign applocation. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.


Also, the ‘private’ information of the user can also being track back notwithstanding the file has been deleted at the ‘recycle bin’. These facts show us that the data are actually available publicly for the ‘hacker’ once the data have been store in the computer.. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating system

No comments:

Post a Comment