If you like shopping online, surfing the internet and use email, the following tips you can do to secure your important data data.
Until this moment the first step to securing your computer is to install an antivirus program. This program will protect your computer from viruses, Trojan horses and malicious worms. If there is a new virus appears, the antivirus software will automatically download the latest virus data from the Internet so that your computer remains protected.
Trojan horse is a small program that infiltrated into our computer from the internet that aim to steal important data in accordance with the wishes of the maker. The data is then uploaded the data to the address when our computer trojan maker is connected to the internet.
One of the program are destructive and very dangerous backdoor trojan virus. The program is designed to exploit existing vulnerabilities in the Windows operating system. Virus activity depends on the desire of the founder. There is data that aims to steal sensitive data from the target computer, some are aim delete important files from Windows, which in the end will damage the overall system. Amazingly, a backdoor trojan virus can hide itself so it is not detected by antivirus software that has been updated though. There are even able to disable the antivirus.
Other malicious programs that potentially disturb the comfort of your computing is spyware. Spyware is a small program attached to free programs that you download from the internet. This program will be very disturbing because it will always show the ads that do not you want when you open these free programs. Besides that, it sends data computing data about your activities to the creator so you are connected to the internet.
If you like air-ria email then you should be careful with what he called a spoof email. Spoof email is a hoax email that seemed to come from large companies such as ebay, paypal, internet banking and others. Email this trick most of the requested data important data from your account for later stolen by the manufacturer. If you get an email like this better if you ignore or ask again about the truth of the email to email contacts from your account.
Finally, if you find that strange symptoms from your computer after activity in cyberspace, immediately do the scanning with an antivirus program. But the most powerful way to secure your computer from all dangers is to always keep your activities in cyberspace. Do not perform actions that you do not know the effect is much less data regarding sensitive data. Use your conscience properly.
Good luck..
Popular Posts
-
Islamabad: Pakistan Telecommunication Company LTD (PTCL) has organization’s new “Position Statement” ‘ Hello to the Future ’ at the start of...
-
Nokia, has announced the launch of an affordable mobile Phone, Nokia C1-01 in Pakistani market. The exciting features of this phone is FM re...
-
CS402 - Theory of Automata PDF Handouts Virtual University
-
How we calculate Physical Address? for the whole megabyte we need 20 bits while CS and IP are both 16bit registers. We need a mechanism to m...
-
Semester “Fall 2011” “ Business Finance (ACC501) ” Assignment No. 01 Marks: 20 Objectives of the Assignment: If a student completes this ass...
-
What are the terms ASCII CODE and SCAN CODE? Scan Code: Each key on the keyboard is assigned a unique number called a Scan Code; When a key ...
-
Kalonji (Black Caraway Seeds) Oil Health Benefits in Urdu & English click on image for LARGER View
-
Telenor has opposed to the expected Vimplecom-Orascom transaction and has formally communicated its reservations to the Chairman of VimpelC...
-
Human processor model Human processor model or MHP (Model Human Processor) is a cognitive modeling method used to calculate how long it ta...
-
Question # 1 of 15 (Start time: 08:34:41 PM) Total Marks: 1 Firms in quadrant-IV of grand strategy matrix have which of the following char...
Video of the Day
Recent
Text Widget 2
Text Widget
Follow us on Facebook
Powered by Blogger.
Translate
Blog Archive
-
▼
2013
(3815)
-
▼
January
(540)
- CS601 GDB Last Date February 06 to February 07, 2013
- STA301 Assignment Solution File
- CS601 Solution File
- THE ADVANTAGES AND DISADVANTAGES OF TELEVISION...e...
- THE ADVANTAGES AND DISADVANTAGES OF TELEVISION...e...
- Advantages and Disadvantages of International Trade
- Advantages and Disadvantages of International Trade
- Advantages and Disadvantages of International Trade
- The advantages and disadvantages of using Facebook
- The advantages and disadvantages of using Facebook
- The advantages and disadvantages of using Facebook
- 10 Weird Parlour Games Played Before TV Existed
- 10 Weird Parlour Games Played Before TV Existed
- 10 Weird Parlour Games Played Before TV Existed
- GIRLS SUNGLASSES...............GIRLS TRY IT ;)
- 10 Strange Ways of Measuring Stuff
- GIRLS SUNGLASSES...............GIRLS TRY IT ;)
- 10 Strange Ways of Measuring Stuff
- GIRLS SUNGLASSES...............GIRLS TRY IT ;)
- 10 Strange Ways of Measuring Stuff
- FLOWERS making from ITALIAN Dough
- FLOWERS making from ITALIAN Dough
- FLOWERS making from ITALIAN Dough
- Question 1 Table
- "I Trust You" – More Difficult (and more powerful)...
- "I Trust You" – More Difficult (and more powerful)...
- "I Trust You" – More Difficult (and more powerful)...
- Bees Make Honey in Jar
- Bees Make Honey in Jar
- Bees Make Honey in Jar
- نظریہ اضافیت خطرے میں، روشنی سے تیز رفتار ذرات
- نظریہ اضافیت خطرے میں، روشنی سے تیز رفتار ذرات
- نظریہ اضافیت خطرے میں، روشنی سے تیز رفتار ذرات
- بسم اللہ پڑھنے سے پانی میں کیمیائی تبدیلی۔
- بسم اللہ پڑھنے سے پانی میں کیمیائی تبدیلی۔
- بسم اللہ پڑھنے سے پانی میں کیمیائی تبدیلی۔
- کعبۃ اللہ سے چاند اور مریخ پر خاص مقناطیسی شعائيں
- کعبۃ اللہ سے چاند اور مریخ پر خاص مقناطیسی شعائيں
- کعبۃ اللہ سے چاند اور مریخ پر خاص مقناطیسی شعائيں
- لوہا زمین پر پایا جانے والا عنصر نہیں ہے
- لوہا زمین پر پایا جانے والا عنصر نہیں ہے
- لوہا زمین پر پایا جانے والا عنصر نہیں ہے
- قرآن مجید ایک زندہ معجزہ
- قرآن مجید ایک زندہ معجزہ
- قرآن مجید ایک زندہ معجزہ
- Kids ROOM Styles
- Kids ROOM Styles
- Kids ROOM Styles
- Coffee and Your Health
- Coffee and Your Health
- Coffee and Your Health
- Hijab Style 2
- Hijab Style 2
- Hijab Style 2
- Top Facts about Snails
- Top Facts about Snails
- Top Facts about Snails
- Top Ten most popular female singers of 2012
- Top Ten most popular female singers of 2012
- Top Ten most popular female singers of 2012
- 10 of the Greatest Unresolved Mysteries
- 10 of the Greatest Unresolved Mysteries
- 10 of the Greatest Unresolved Mysteries
- cho cute Cats With Spectacles O_O
- cho cute Cats With Spectacles O_O
- cho cute Cats With Spectacles O_O
- Mathtype Help
- Grammar Books
- Data and Computer Communications - william stallings
- Data Communications and Networking Behrouz a Forou...
- Automata FA in Ms Word
- Devcpp 5.1.0.0 64bit (For Window 7)
- Dev C++ installation guide
- The C programming Language by Kernighan and Ritchie
- How to Write your first Program in DevC.doc
- Math Type Video Tutorials
- CS601 Solution Assignment
- 101 Olive Oil Benefits
- 101 Olive Oil Benefits
- 101 Olive Oil Benefits
- Cute Cats And Kittens Collections... sho shweett !!
- Cute Cats And Kittens Collections... sho shweett !!
- Cute Cats And Kittens Collections... sho shweett !!
- Top Ten Best Manga Ever
- Top Ten Best Manga Ever
- Top Ten Best Manga Ever
- BEST FURNITURE DESIGNS...........
- BEST FURNITURE DESIGNS...........
- BEST FURNITURE DESIGNS...........
- Subject: Idea about 2nd Assignment MGT111 Fall 2012
- MGT111 Assignment No. 2 Solution Due date MAY 03, ...
- MGT503 2nd question
- MGT503 1st questn ka solution
- MGT503 Question 2 solution
- CS410 Assignment Solution
- World’s Richest Women 2012 – Women Billionaires
- World’s Richest Women 2012 – Women Billionaires
- World’s Richest Women 2012 – Women Billionaires
- Beauty of Winter
- Beauty of Winter
-
▼
January
(540)

0 comments
Post a Comment