The dangers of downloading games, photos, videos, music, Internet, sharing files:
Currently the Internet is actually a custom ah mass, making it nearly impossible to continue with our work without using a PC connected to the Internet, but this in turn brings a few disadvantages because every day there are more dangers brings surf the Internet, this lack of security is ah been heightened especially downloads made by users via Peer to Peer networks.
The methods used usually spam type advertising ah increasingly effective result for such purpose, also the use of Trojans that attach to files, usually codecs and multimedia files, this makes the spread of this type of advertising unwanted expand each time more and ah result is that a very effective way data transmission via peer to peer networks.
It has proven that the most malicious code that haunt the peer to peer type BIT Torrents, Gnutella, eDonkey and Fast track ares are worms with Kido type generalization, these worms Exploit the operating system Windows and what it does is use valuable system resources, this current epidemic ah fact that this virus is considered in the top 10 current virus on the Net
This spread was predictable from very soon as the virus is easily distributed peer to peer networks and dynamic worm code.
With respect to new programs with these malicious codes have emerged recently in peer to peer networks and are capable of reproducing themselves capable of infecting files because they have the ability to download malicious files by themselves, after downloading the worm installed on the PC and played by itself, making copies of the transmitted and becoming publicly accessible.
The propagation mode is changed using the name by other known files, this makes the person you think is downloading downloading the file you want to search, but when I played it very differently.
The propagation medium used by this worm, as I said, is through peer to peer networks, but also often use other means of transmission that is sharing the network, LAN, or even expandable via sometimes uses email , making the PC more vulnerable is the level of confidence we place in any known PC or any device of any known user, this makes the security level of our PC down.
That is why we must not lower our guard and especially we should not lower our PC security, to achieve this we must always have an antivirus quality, this updated, as well as the required patches for your operating system, especially If you use Windows, since it is the most vulnerable to malicious code attacks.
Currently the Internet is actually a custom ah mass, making it nearly impossible to continue with our work without using a PC connected to the Internet, but this in turn brings a few disadvantages because every day there are more dangers brings surf the Internet, this lack of security is ah been heightened especially downloads made by users via Peer to Peer networks.
The methods used usually spam type advertising ah increasingly effective result for such purpose, also the use of Trojans that attach to files, usually codecs and multimedia files, this makes the spread of this type of advertising unwanted expand each time more and ah result is that a very effective way data transmission via peer to peer networks.
It has proven that the most malicious code that haunt the peer to peer type BIT Torrents, Gnutella, eDonkey and Fast track ares are worms with Kido type generalization, these worms Exploit the operating system Windows and what it does is use valuable system resources, this current epidemic ah fact that this virus is considered in the top 10 current virus on the Net
This spread was predictable from very soon as the virus is easily distributed peer to peer networks and dynamic worm code.
With respect to new programs with these malicious codes have emerged recently in peer to peer networks and are capable of reproducing themselves capable of infecting files because they have the ability to download malicious files by themselves, after downloading the worm installed on the PC and played by itself, making copies of the transmitted and becoming publicly accessible.
The propagation mode is changed using the name by other known files, this makes the person you think is downloading downloading the file you want to search, but when I played it very differently.
The propagation medium used by this worm, as I said, is through peer to peer networks, but also often use other means of transmission that is sharing the network, LAN, or even expandable via sometimes uses email , making the PC more vulnerable is the level of confidence we place in any known PC or any device of any known user, this makes the security level of our PC down.
That is why we must not lower our guard and especially we should not lower our PC security, to achieve this we must always have an antivirus quality, this updated, as well as the required patches for your operating system, especially If you use Windows, since it is the most vulnerable to malicious code attacks.
0 comments:
Post a Comment