In your PC, there are many ports which are vulnerable to attack from a hacker. With these ports, you can communicate internally with your monitor or printer or externally to the Internet. Port 25, which is used for receiving incoming email and Port 80 is used to connect to the, is one example.
Aside from this, you also have a unique IP number which is assigned to your computer by your Internet Service Provide which is required for you to use the. With this, you are able to send and receive information. Another thing this does is serve as your computer's address. An example of an IP number would be 106.185.21.243. If you have DSL or broadband connection to your IP address, then this rarely changes which can make your computer very vulnerable. By connecting to the Internet via dial up, you are then typically assigned a new IP address every time you log on, but this doesn't been you are not vulnerable to attack. Another issue is that with broadband connection you are likely to be on line for longer periods of time giving hackers more opportunity to attack you.
Hackers use "port scanning" software to hunt for for vulnerable computers with open ports using your computer's IP address. What they will do is send malicious programs through these open ports onto your computer.
Sending out Trojan Viruses disguised as email attachments is another common way that hackers use to gain control of your computers. What hackers would typically do is send out these messages to 1000s of users with enticing headings and an attachment which they are hoping you will open . The virus loads itself onto your computer and allows the hacker to control your computer when the attachment is opened.
Another thing hackers would do is bundle Trojan viruses into free downloads like screensavers which are commonly installed on home user's machines. Illegal P2P networks also circulated large numbers of infected files.
Here are tips that you may want to consider
Make sure you are receiving the latest Window's updates. Do you have a good firewall installed. Install a spyware removal tool get the spyware definitions up to date. At least once a week or after being on line for a long period of time, you need to run a scan. Install an anti virus program and keep the virus definitions up to date. You should carry out a virus scan at least once a week. Using a Spam Filter can help stop dangerous email.
There are further actions you can take.
Don't open suspicious looking email messages especially if they have attachments. When it comes to free software, it's best to be careful about downloading it. Be sure to only download from reputable sites. Another thing you need to do is switch off your broadband connection if you are away from your computer for a long period of time. At night time, you should always switch off your computer and broadband connection. When it comes to wireless network users, this is especially relevant.
Aside from this, you also have a unique IP number which is assigned to your computer by your Internet Service Provide which is required for you to use the. With this, you are able to send and receive information. Another thing this does is serve as your computer's address. An example of an IP number would be 106.185.21.243. If you have DSL or broadband connection to your IP address, then this rarely changes which can make your computer very vulnerable. By connecting to the Internet via dial up, you are then typically assigned a new IP address every time you log on, but this doesn't been you are not vulnerable to attack. Another issue is that with broadband connection you are likely to be on line for longer periods of time giving hackers more opportunity to attack you.
Hackers use "port scanning" software to hunt for for vulnerable computers with open ports using your computer's IP address. What they will do is send malicious programs through these open ports onto your computer.
Sending out Trojan Viruses disguised as email attachments is another common way that hackers use to gain control of your computers. What hackers would typically do is send out these messages to 1000s of users with enticing headings and an attachment which they are hoping you will open . The virus loads itself onto your computer and allows the hacker to control your computer when the attachment is opened.
Another thing hackers would do is bundle Trojan viruses into free downloads like screensavers which are commonly installed on home user's machines. Illegal P2P networks also circulated large numbers of infected files.
Here are tips that you may want to consider
Make sure you are receiving the latest Window's updates. Do you have a good firewall installed. Install a spyware removal tool get the spyware definitions up to date. At least once a week or after being on line for a long period of time, you need to run a scan. Install an anti virus program and keep the virus definitions up to date. You should carry out a virus scan at least once a week. Using a Spam Filter can help stop dangerous email.
There are further actions you can take.
Don't open suspicious looking email messages especially if they have attachments. When it comes to free software, it's best to be careful about downloading it. Be sure to only download from reputable sites. Another thing you need to do is switch off your broadband connection if you are away from your computer for a long period of time. At night time, you should always switch off your computer and broadband connection. When it comes to wireless network users, this is especially relevant.
No comments:
Post a Comment