Malware

of 3

Please download to get full document.

View again

All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
PDF
3 pages
0 downs
25 views
Share
Description
1. Safe Surfing: Malware 2. Wireless viruses, worms, and Trojan horses risk ã What are they? ã Worms are programs that replicate themselves and consume a lot of your…
Transcript
  • 1. Safe Surfing: Malware
  • 2. Wireless viruses, worms, and Trojan horses risk • What are they? • Worms are programs that replicate themselves and consume a lot of your memory and can cause crashes. Some are able to send themselves out through your contacts. • Trojan Horses are programs that seem to be what you needed in the beginning, however it actually opens a backdoor for hackers to spy on your computer. • Viruses can corrupt or delete your programs or files and are often spread through attachments in Emails or IM’s. • There are some that can transfer through Wi-Fi. • How do you prevent them from occurring or fix the damage? • If you want to prevent encounters with them the best thing to do is to make sure that your OS and Protection software is up to date. These can help you by possible alerting and removing system threats that were undetectable in past versions. • However since there is always a possibility of a new version of viruses, worms, or Trojan horses the best thing to do is for you to be a bit smarter in what you do. For example if you are downloading something make sure that it is from a reputable site or had positive feedback from others who downloaded it. (10 people telling you it’s a safe site might not be enough) • If you already encountered these malware then the best thing to do is to stop and try to remove what remains if possible and restore your data if you have saved from before. Things such maybe your music, personal pictures, or important documents that you made online copies of. Always back up important information so you can restore when these things occur.
  • 3. Wireless LAN Security Risks • What is it? • WLAN is a wireless local area network which allows 2 or more devices to connect with a wireless distribution method. There is a limit to its range which can range from a home, school, computer laboratory, or office building. • What are the risks? • If the network is public then it is open to a large amount of people. Within that group of people could be some who are poking around people’s information if their settings are not secure. They could possibly be looking for your personal information to use in the future, or even make you a scapegoat for whatever they have done. • What can I do to prevent this? • One of the things most people agree on is to treat all public connections with caution. It is public and everyone can access it. If it is possible try to use a connection that is not available to everyone and is protected. For example if you can use your phone’s connection then use that. • If you are the one in control of the network then it is best if you encrypt your things. Encryption scrambles the information you send over the internet into a code so that it’s not accessible to others. Some of the old routers use only WEP encryption, which may not protect you from some common hacking programs. Newer ones have access to WPA2 which is currently the top. • If you do not want to buy a new router then another possibility is for you to allow only specific computers to use your connection by limiting it to certain Media Access Control (MAC) address. This is not exactly reliable since others can copy this address
  • Related Search
    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks