123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Do You Know What The Blunders Of The Security Of Computer

Profile Picture
By Author: Danny Pereira
Total Articles: 11
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Many people complain that computers have been plain added protection, but still by viruses, Trojan horses, hacker attacks. Actually the reason is very simple, as we the locked door, no guarantee that things are not stolen. In fact use,due to the lack of computer security knowledge, there are many security pitfalls, so that is not safe for computer think safe, and relax vigilance.
In order to avoid this spread, today and to join together to see through these security pitfalls.
1.Local area network computer very safe
Mistake: LAN because of the agent is to share Internet, itself is not exposed to the Internet, but hidden in the proxy server after, all of the attack is directed at the proxy server, and the connection of computer business.
Right: Although hidden in the proxy server after, really can to a certain extent have certain security. But in you to browse the malicious website, operation bound Trojan files, or download the document contains virus, etc, these services proxy server but not interference, your computer so exposed.

2.Dial up the Internet without a fixed IP's safety
Mistake: ...
... Now many users are broadband dial up the Internet. Since broadband dial-up every time get IP address all isn't fixed, and at the same time, because in the Internet connection is established by IP to finish. So no fixed IP address, is equivalent to an intruder could not find ourselves, so that their computer is safe.
Right: dynamic get IP and not every minute fixed, want to know at the same time become disconnected, before you use IP address or fixed, such as long as the other party know your IP, if there is no security guard, the other party may in a few minutes to complete the invasion. Second, if be kind of against the elastic trojans, so no matter your IP address how to change, your IP change information will be sent to the invaders, and even his own initiative to establish contact with the invaders, and no matter what is your IP address.

3. Have antivirus software is safety
Mistake: I have already installed the original of antivirus software, in under the protection of the antivirus software, from then on don't worry about the safety problems.
Right: Antivirus software is the most important in the virus have killing effect, but to spyware preventive towardsreducing it. Second, installed antivirus software not to update the latest virus library, also can't for some new virus or old variations of the virus have prevention effect. Also now antivirus software are largely passive defense, namely the new virus after coming out again to study the method of killing, it must have a period of time, and the virus may be in this period of time have invaded your computer.

4. Had a patch safety
Mistake: My computer can update all kinds of patches, in this way hackers don't invade my computer.
Right: And virus, found that loophole to vulnerability is modified, the meantime needs a period of time. This period so others can use the holes to attack you. A patch is targeting a loophole, you had the patch, only goes to show that the hole is not being used, but other potential loophole assures hard.

Amateurs must understand computer use the erroneous zone, don't always complain that the network safety, In fact, you know the total to strengthen protection, the network is safe. As long as you computer basic knowledge is not all don't understand, you can use computers in safety.


Dreams take off from here, many guys don't have enough time to farm the
C9 Gold they need,
trade is it safe ? huge stuffs are interest in affording the extra gold they need to be competitive.
Buy C9 GoldSo at last the shortest way to get the safe cheap C9 Gold directly is to buy gold from a legit game's website,we can offer awesome service.

Total Views: 163Word Count: 642See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: