Wednesday, 13 January 2016

More on On-line Security

In this blog, I'm going to give some details on being secure while on-line. 


Browser Setting


A browser is a device that connects a computer to the world wide web. 




Password Strength


When people on-line, they use a key called password.  Say that your user profile on computer is like your house on your home street, a password would then become your house's front door key.  A hacker attempting to hacker into your computer's user profile is like a thief attempting to picklock your home's lock. 


Make sure that your password is known only to you and easy to remember, but make it difficult for hackers to get.  The longer and more random the password, the more protected your computer and user profile will.  Some password can use different letters for key letters in the password, like the "@" can stand in for the letter "a".  Some of the smaller keys can be replaced with capital letters, so for example, the word "tree" could be used like "tRee", this makes it harder for a hacker to solve. 




Encryption Email


The first question to ask is, what is an email? An email is like mail, only it's on the computer and internet.  While mail, like a letter or parcel, can take a couple of days to be delivered, email can be delivered in seconds. 


An encrypted email is the same email, only it's encrypted (a bit like a coded message) and that makes it hard to read for the people the encrypted email is for.  Only the person at the receiving end of the encrypted email will be able to read the email.  Emails accounts like Hushmail is a good example for encryption email accounts. 




DDOS


Distributed Denial-of-service attack (DDOS) is when a hacker uses a number of computers and servers to hack into your server and computer (it can range from a couple of computers to thousands).  It can make finding the hacker more difficult for the people who wishes to find the hacker. 




Computer Viruses
Trojan
A Trojan virus takes it name from the infamous Greek Trojan Horse, in which the Greek army hide a wooden horse in order so that the Trojan army would take the wooden horse inside their city, thinking it was a gift, only be surprised by the Greek army.  In much the same way, a hacker can send an email from a Trojan device that can allow the hacker to access the computer with the computer's user being aware until it's too late. 


A way of protecting your computer from a Trojan virus is double-check where the email containing it comes, see if it's from someone you can trust. 




Malware
A malware virus is more or less like a cold people can get.  The malware virus gets into a computer, either through a download or by email, and once it's inside the computer, the virus can cause both harm and damage to the computer.  The virus can delete files from the computer and make the computer do the opposite the user wishes to do. 


To prevent malware from getting into your computer is do a regular anti-virus check on your computer. 




Phishing
Phishing takes its name from the word "fishing".  This virus gets into the computer and starts searching anything that the hacker might like, like passwords to personal internet shopping sites and account numbers for bank accounts.  The hacker could steal private photos from the computer and then release them to the world for all to see and it can cause huge embarrassment and serious harm to the user of the computer. 


Spyware
A spyware virus does what its name suggests, the virus gets into the computer and spies about for the hacker who created and sent the virus.  Working much like the phishing virus, the spyware virus can cause harm and embarrassment to the computer's user. 


A way of preventing phishing and spyware from getting into your computer is double-check your computer's anti-virus firewall regularly and do a anti-virus run of your computer. 


Link to my previous blog for security sites worth visiting: http://chriscollegeblog2014.blogspot.co.uk/2016/01/security-sites-worth-visiting.html




I hope that this blog was very interesting in helping you protect your computers. 

No comments:

Post a Comment