Security in the Internet: basic rules

Date:

2018-03-22 19:06:20

Views:

560

Rating:

1Like 0Dislike

Share:

Table of contents:

What kind of issues creates security in the Internet? Perhaps the machinations of hackers is just spectacular footage from the movie, but in reality, the network space is not as hostile as we are trying to instill in scripts of blockbusters? In some cases, the safety rules of the Internet, you should observe very carefully?

Hackers online

The Reality is that hackers are not asleep. Their interest fuels primarily still growing commercialization of virtual space. People use virtual Bank accounts to pay for purchases with credit cards, exchange currency. The security of Internet payments - a very relevant aspect.

Internet Security

Of Course, there is a significant percentage of hackers, acting in their own ambitions, to prove to yourself or friends - now, this e-mail I will crack. There are, if we talk about the industry of hacking, the segments associated with the business wars. Talent "hackers" used the Corporation in order to, for example, to gain secrets from competitors.

However, even regular users, far from big business, may experience discomfort due to the fact that security problems on the Internet is very relevant. And it is not necessary in view of the risk of losing control over the financial operations. This can be expressed, in particular, that the hacker is able to turn the PC of another user in a hotbed of aggressive advertising, or to access the confidential personal data. All this, of course, unpleasant.

How to improve security in the Internet? We will now discuss.

Tools hacker

But first, consider what tools the hackers to compromise the online safety of users. In the main the same as have been used for many years. Is viruses, Trojans, various "spy". With various kinds of malicious code a hacker may, at first, to capture logins and user passwords for e-mail, banking customer, credit card, etc.

Recommended

How to get out of

How to get out of "Skype" on the "Android" and not only

How to get out of "Skype" "Android"? This question bothers many users. The thing is that the messenger is not so difficult. But there are features that are only for mobile versions. To log out of Skype in this case more difficult than it seems. But i...

Kingo ROOT: how to use the program to gain administrative rights on Android

Kingo ROOT: how to use the program to gain administrative rights on Android

The Gadgets on the platform Android regained the lion's share of the market. Developers are continually perfecting the OS, trying to fit the needs of the users, but from year to year admit palpable mistake: forbid the owner to "stuffing" of his gadge...

How to get from Stormwind to Tanaris: practical tips

How to get from Stormwind to Tanaris: practical tips

World of Warcraft is an iconic MMORPG, uniting millions of players around the world. There are many locations and puzzles, secret trails and larger, but rather dangerous paths. Sooner or later, every player chose the side of the Alliance, we have to ...

security Rules of the Internet

In General, security of personal data on the Internet - the question of the most important due to the extremely high activity of hackers, biased, usually in financial terms. There are of course other areas of interest to the hackers. As we have said above is private data. But almost always it comes down to extracting some financial benefit - through advertising, as an option, mechanisms.

Let us now Consider the channels through which most often occurs the infected user's PCs with viruses and Trojans or acquired direct access to personal data through logins and passwords. In any aspects of computer use and Internet PC owners should be especially careful?

You're an impostor yourself

One of the most commonly used methods hackers gain access to passwords and the computer resources - to appeal to users on behalf of well-known Internet service, blog post service, Bank, shopping online or even ISP. The attacker usually writes compiled in a very diplomatic form of the letter in which asks to "confirm identity" or under a different pretext to specify a username and password. Externally, the e-mail message in terms of design can be hung with the real logos of the resource which the hacker declares. And the domain used in the email address can be very similar to the original.

Secure online payments

In addition to this method is used when the letter is no request for username and password, but there is a polite request to click on the link to the same "confirm identity". In a similar way can come enticing nature of advertising messages. Of course, they are all a security threat on the Internet. To respond to this kind of treatment is impossible. By clicking on the link, the user will almost certainly download a malicious code whose purpose can be very different, as a rule - file transfer usernames and passwords from the computer.

Resist the temptation

Hackers may use a different scenario. Technologically, it is somewhat similar to the method of use references to "confirmation". However, the long-awaited click is done by user is not in force shilling for the treatment of e-mail, and in fact the temptation to explore interesting ad popped up on the screen, or is that too common offer from some elegant ladies "to get acquainted" by appearing from nowhere emerged on the screen of the window. Click and user downloads to their PC a virus. Therefore, safety on the Internet-based immunity to such temptations is the most important factor of security of personal data.

Free cheese

The Internet is often used as a free channel, movies, music videos, download programs. Even in cases where the original version of the media or application - commercial, does not, however, looking for a website where you can get access to movies and software distributions free. It is worth noting that a few years ago, such resources present on the Internet in large numbers, and they really could detect the distributionpricey FOR a free key or activator as a gift. With movies the same way.

safety on the Internet

Today the situation has changed. Tightened Russian legislation in terms of control over pirated IT product versions and movies, improved the mechanisms by which providers can detect portals, which posted unauthorized copies of software and media files. Much is done in order to improve user safety. And the anonymity of the Internet is minimized to prevent attempts to upload pirated content.

If you have never had any problems to find a pirated version of the blockbuster before it will be released on cinema screens today after several months from the release date of the film is very hard to find a portal where he would be posted for free. Online safety is now actually at the state level. Actually, what does that mean?

With a high probability, that even if the user manages to discover a site where there is a pirate version of the film to be downloading the files are free of viruses. The logic is simple. If this website functioned without violating security on the Internet (that is a focus, as it was a few years ago, on the distribution of unlicensed content), the hosting provider long ago figured out would be blocked.

How to secure the Internet

Today's users forget about the fact that the Internet today - "free" cheese. And therefore not to trust and not to test the portals, which seem to have a free copy of favorite movie. Moreover, there are now many options to view or even download a legitimate version of media inexpensive, at least cheaper than going to the movies. As for programs - the majority of commercial applications today is usually not competitive one free alternative.

A gift from a friend

Of Course, the option to pick up a virus or Trojan, there is not only thanks to the virtual channels. It often happens that the user complies with the above safety rules of the Internet strictly, but his computer somehow inexplicably becomes infected with malicious code. The most probable reason is a virus accidentally brought a friend on a flash drive. Or, using the medium for printing text or pictures in the cabin, the user inadvertently "caught" the virus from them.

Secure personal data on the Internet

In this case, it's really hard to predict whether there is on the flash drive, bring into the operation on another PC, this kind of surprise. Therefore, the user needs to possess the skills not only passive protection from threats (to avoid contact with suspicious online content), but also some active tools. What?

Antivirus software

The right view in this case is antivirus. This kind of IT products is now more relevant than ever. It is undesirable to use a modern computer without pre-installed a good antivirus. What are the quality criteria for this kind of application? Experts prefer to pay attention to what the market says. He, unlike many other segments, in this case is far from monopolistic trends: competition of IT companies producing antivirus software, are very large. Therefore, if a company leader, that status is likely to have given her for a reason.

And therefore, improving security measures on the Internet, the user should pay attention to the well-known antivirus brands like Kaspersky, ESET, Symantec, DrWeb. Experts recommend not to save on such programs. Yes, the license costs about $ 50. However, in return the user gets a really good, effective tool to combat malicious code.

a security Threat to the Internet

Firewalls

In addition to antivirus, it is highly desirable to put firewalls (firewall). These programs are designed to filter the access of applications installed on the PC, the Internet (as well as to control access to the computer from the subjects in the virtual space). That is, if, for example, is still a Trojan slipped past antivirus software (Yes, it can be), with quality working Fairvale it is with high probability not be able to transfer is detected on a PC logins and passwords to the hacker. Attempts to send files to the Internet-will block.

Regarding firewalls: experts also recommend not to save and buy a commercial version of such programs, and even better - integrated products in which the functions of the antivirus and firewall very efficiently combined. Among those - from the Kaspersky Internet Security or Smart Security from the Slovak competitors of Russians - of the firm ESET.

Browser will protect us

Internet Access is via a browser. Accordingly, the main channel of malicious code on the PC is a window of that application. How to ensure safety on the Internet using a browser? Some experts recommend that adhere to the concept of the "what not to do". Try to navigate and we at her. Thus, using a browser, the user should not:

- save usernames and passwords insideprograms (even if she offers to do so);

to ignore the update feature of the browser;

- to include without the need of various kinds of extensions, scripts, scenarios.

Actually, on the first point clear. Passwords and logins that Trojan is on the PC, obviously written by the browser in a file. If not, then malicious code nothing will be able to transfer to the hacker. It is extremely important to observe this rule, if the user wants to ensure the security of online payments.

Updating your browser is important from the point of view that manufacturer every time improving internal system protection from low-level hacking and malicious codes that for one reason or another can't be detected by antiviruses.

In Fact, samples of the hackers, referred to, are focused on the so-called "holes" in browsers, arising from the excessive passion of users install the mentioned extensions, scenarios and scripts. You can almost always do with options that are configured by default. There is absolutely no compelling reason to include more, to the delight of hackers.

Step into the camp of competitors

Many of the IT is recognized by experts that your operating Windows system, because of their architecture, is much more vulnerable to viral threats, if you compare it to alternative platforms. First of all, such as Linux and Mac. At least, according to the estimates of many experts, the quantity created for these operating systems, viruses are much smaller than those that are written for Windows. The main argument here - a relatively small share of alternative platforms on the market. Because hackers is not really interested in writing viruses for these OS. Which, moreover, according to some experts, it really is better protected from malicious codes.

The Question is why the users are not moving from Windows to Linux and Mac? Regarding each OS has its own reason. If we talk about Linux, this operating system significantly harder to use. If the Windows driver and installed through the automatic algorithms used in the OS, in Linux to install some programs have almost manually. This does not suit many users, and they prefer to own an OS that is designed to be simpler. Although Linux is completely free. These are the principles of its creators, those who have made this OS created by Amateurs, to the global project. By the way, there are so many versions of Linux with different design and management interfaces that users can always find comfortable for yourself. But what is most important - for many of the IT professionals who helped to develop this project online safety is the most important priority.

With regard to Mac the reason is different -- it is just the same in price. Computers on the basis of this OS is significantly more expensive than those that can be Windows and Linux. They are a platform from Apple that is implemented on different technical principles than PC related to architecture IBM PC, compatible with Windows and Linux.

However, if computer use is to work with the Internet, office documents, simple graphics files, and there is a special need to run the game, it is possible to pay attention to Linux. Note that the programs for this OS, in which it is possible to use the above functions, as a rule, do not belong to the category of those that are installation manually. Almost all modern browsers have a Linux version, no way inferior to the distributions for Windows. There are many office applications, the functionality of which is generally comparable to Word, Excel, and complementary programs.


Article in other languages:

AR: https://tostpost.com/ar/computers/11013-security-in-the-internet-basic-rules.html

BE: https://tostpost.com/be/kamputary/19723-byaspeku-nternece-asno-nyya-prav-ly.html

DE: https://tostpost.com/de/computer/19732-sicherheit-im-internet-die-wichtigsten-regeln.html

ES: https://tostpost.com/es/los-ordenadores/19743-seguridad-en-internet-las-reglas-b-sicas.html

HI: https://tostpost.com/hi/computers/11027-security-in-the-internet-basic-rules.html

JA: https://tostpost.com/ja/computers/11027-security-in-the-internet-basic-rules.html

KK: https://tostpost.com/kk/komp-yuterler/19722-internetteg-au-ps-zd-k-neg-zg-a-idalary.html

PL: https://tostpost.com/pl/komputery/19691-bezpiecze-stwo-w-internecie-podstawowe-zasady.html

PT: https://tostpost.com/pt/computadores/19692-seguran-a-na-internet-regras-b-sicas.html

TR: https://tostpost.com/tr/bilgisayarlar/19726-evrimi-i-g-venlik-temel-kurallar.html

UK: https://tostpost.com/uk/komp-yuteri/19710-bezpeka-v-nternet-osnovn-pravila.html

ZH: https://tostpost.com/zh/computers/11830-security-in-the-internet-basic-rules.html






Alin Trodden - author of the article, editor
"Hi, I'm Alin Trodden. I write texts, read books, and look for impressions. And I'm not bad at telling you about it. I am always happy to participate in interesting projects."

Comments (0)

This article has no comment, be the first!

Add comment

Related News

Deus Ex: Human Revolution - walkthrough, tips and help

Deus Ex: Human Revolution - walkthrough, tips and help

Deus Ex: Human Revolution - project varied, from whatever side you look. The action takes place in the future, where individual human limbs (and not only) came state of the art implants, prisanee to make people's lives safer and m...

The collapse of the Adobe Flash Player: what to do?

The collapse of the Adobe Flash Player: what to do?

unfortunately, Adobe Flash Player is not the most reliable software that can be installed on the PC. Therefore, in the process of work can happen a variety of issues that lead to his so-called collapse and other problems. In this ...

Skylake processor from Intel. Description, characteristics, types and reviews

Skylake processor from Intel. Description, characteristics, types and reviews

In August 2015 was presented the 6th generation of computing chips from “Intel” - Skylake. The CPU relating to this generation, received a significantly redesigned architecture that allowed to increase performance by 1...

How is the encoding of graphical information in the computer?

How is the encoding of graphical information in the computer?

In the middle of the last century, in connection with the need to visualize the data beginning to emerge in the coding of graphic information. To date, we can't imagine a full-fledged computer without a big glossy screen. Modern s...

How to remove friends from friends: remove friends from social networks

How to remove friends from friends: remove friends from social networks

so, today we learn you how to remove friends from other social networks. In truth, each site is done in different ways. However we will analyze with you two very popular and common social networks "Vkontate" and "Classmates". With...

What is WDS? How to configure WDS?

What is WDS? How to configure WDS?

Many Internet users interested in what is WDS and what are the advantages. Wireless Distribution System, or WDS, is a wireless technology that is used for the following purposes:increased network coverage - this is done by consoli...