Кандидат филологических наук, доцент Казну т. Т



бет90/143
Дата15.03.2022
өлшемі2,47 Mb.
#135726
1   ...   86   87   88   89   90   91   92   93   ...   143
Байланысты:
EITS

Trojan horses are malicious programs disguised as innocent-looking files or embedded within legitimate software. Once they are activated, they may affect the computer in a variety of ways: some are just annoying, others are more ominous, creating a backdoor to the computer which can be used to steal data. They don't copy themselves or reproduce by infecting other files.

  • Spyware, software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software. It usually comes hidden in fake freeware or shareware applications downloadable from the Internet.

Due to its anonymity, the Internet provides the right environment for cyberstalking, online harassment (sending threatening email messages and slandering people) or abuse, mainly in chat rooms. False accusations and transmission of threats fall under the class of cyberstalking activities.


There is a large number of ways that can be used to protect your computer from all these threats:



  • Use strong passwords (at least eight characters long).

  • Don't open email attachments from unknown people; always take note of the file extension.

  • Run and update antivirus programs, e.g. virus scanners.

  • Install a firewall, a program designed to prevent spyware from gaining access to the internal network.

  • Make backup copies of your files regularly.

  • Stay away from untrusted networks.

  • Use a digital certificate, an electronic way of proving your identity, when you are doing business on the Internet. Avoid giving credit card numbers.

  • Don't believe everything you read on the Net. Have a suspicious attitude toward its contents.





Достарыңызбен бөлісу:
1   ...   86   87   88   89   90   91   92   93   ...   143




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет