How you can avoid being a victim of vicious scams.It's about a little knowledge and simplesteps you can take to avoid these criminals.Three out of five emails are "SPAM". It's not surprising that it annoys us because there's somuch of it, and the content ranges from adverts to porn, begging letters and scams.With regard to emails spam means "unsolicited bulk email" -Bulk email means sending the same message to manythousands of people, a favorite with spammers. Someone somewhere will click on it.The email trick test will help you to avoid a very nastyscam called "Phishing". You might receive an email: "We suspect an unauthorized transaction on your account. Toensure that your account is not compromised, please clickthe link below and confirm your identity." "During our regular verification of accounts, we couldn'tverify your information. Please click here to update andverify your information"They're trying to get information from you such as creditcard details, bank account information, Social Securitynumber, passwords, or other sensitive information.Once they get your personal details, they go for the shortterm gains by raiding your bank account and "maxing out"your credit cards. They can also take out loans in yourname. You probably won't know about it until the loancompany's start chasing the overdue payments.Legitimate companies will not ask for personal informationby email. Don't let the style of the email mislead you, it's very easy to copy bank headers. Don't use any linksfrom these emails as they can make links look as ifthey're going to one place, but they're being redirectedto another.If you get an email with an attachment and you don'trecognise the sender, don't open it, delete it.Attachments to emails can transfer a virus; it's oftenlaunched when you open the attachment (usually by double-clicking the attachment icon). Malware - software designed to infiltrate or damagecomputer systems. Malware commonly includes computerviruses, worms, Trojan horses, spyware and adware. Viruses - a computer virus behaves in a similar way to abiological virus, which spreads by inserting itself intoliving cells. The negative effect of computer virusesincludes uncontrolled self-reproduction, which canoverwhelm your computer. They can erase files and corruptthe operating system. They can arrive on a floppy disk, from a download, or an attachment to an e-mail. Worms: a self-replicating computer program similar to acomputer virus. A worms self-contained and doesn't needanother program to propagate itself. Worms tend to harmthe network and consume bandwidth, whereas viruses infector corrupt files on a targeted computer. Trojan horses: Trojan horse programs can't operate on theirown like viruses or worms. A Trojan horse, technically anormal computer program, does not possess the means tospread itself. They will probably be part of a free game orprogram. In the background it might modify or delete files, changethe configuration of the computer, or even use thecomputer as a base from which to attack other computers.Spyware its software that gathers information on how you useyour computer, and then transmits the data to anothersource. It can also transmit the usernames and passwordsyou've typed in online.Adware - it's software that displays advertising on yourcomputer. Spyware and adware are often part of the sameprogram. But when the software starts silently spying onyou, it stops being harmless.Hackers / criminals can run software on your computer, place malicious code on your hard drive, and even copyexactly what you're typing.What You Can Do About It - It's Easy and EssentialFirst a few explanationsA Firewall examines the traffic/data coming into and goingout of a computer, and then either all>exactly what you're typing.
|
วันพฤหัสบดีที่ 27 มีนาคม พ.ศ. 2551
สมัครสมาชิก:
ส่งความคิดเห็น (Atom)
ไม่มีความคิดเห็น:
แสดงความคิดเห็น