Notice: Undefined index: article137 in /www/hardwaresecrets/article.php on line 5 Protecting Your Computer Against Invasions | Hardware Secrets
Hardware Secrets
Home | Camera | Case | CE | Cooling | CPU | Input | Memory | Mobile | Motherboard | Networking | Power | Storage | Video | Other
Content
Articles
Editorial
First Look
Gabriel’s Blog
News
Reviews
Tutorials
Main Menu
About Us
Awarded Products
Datasheets
Dictionary
Download
Drivers
Facebook
Links
Manufacturer Finder
Newsletter
RSS Feed
Test Your Skills
Twitter
Newsletter
Subscribe today!
Recommended
Maximum Security: A Hacker's Guide to Protecting Your Computer Systems and Network, 4th Edition (Book and CD-ROM)
Maximum Security: A Hacker's Guide to Protecting Your Computer Systems and Network, 4th Edition (Book and CD-ROM), by Anonymous (Sams), starting at $39.19


Home » Networking
Protecting Your Computer Against Invasions
Author: Gabriel Torres 47,479 views
Type: Tutorials Last Updated: May 10, 2005
Page: 1 of 3
Trojan Horses

With the popularization of broadband Internet connection, more and more users have their Internet connection active during all the time the computer is on. Even if you are not in fact accessing the Internet, the computer is connected. This way, such user tends to be more worried about invasions than the users who access the Internet through dial-up connections or users who don't have access to the Internet.

To start with, it has to be understood that a hacker can only invade your computer if you "let" him/her do it. For instance, a hacker can only invade your computer using a backdoor like Netbus and Back Orifice if you have that type of program installed in the computer. That type of program transforms your computer in a server, making it possible for anybody in the world to invade your computer and read your files (with the appropriate tool, of course). But who is crazy enough to install a program like type in the computer? Nobody, of course. They usually come as "Trojan Horses", that is, disguised as cool screen savers that a friend (a friend?) has sent you. Luckily, now all antiviruses recognize and remove that type of program, hence the importance of having an updated antivirus program in the computer.

Pay attention because nowadays Trojan Horses come in fake e-mails supposedly coming from banks and stock brokers. For example, in you have a checking account on Citibank and receives a fake e-mail saying that you should update your data and provides a direct link to do so, you might be tempted clicking on the link or even installing the software that may have come attached to this fake e-mail. DON'T DO SO! This link or software will steal your passwords and banking data! This technique, also known as phishing, is becoming more and more popular.

The best piece of advice? Don't click on links nor install softwares that come from people you don't know. Since a lot of people nowadays know about phising, people behind these scams are now sending e-mails saying that someone you love sent you an e-card or something like that, asking you to click on the provided link for you to read the lovely message. Don't be silly, don't click on these links! It's a Trojan Horse!
 
But, besides Trojan Horses, what other type of procedure a common user may unintentionally perform which will let his/her computer become exposed to invasions? File sharing. Let's explain more about this.

Print Version | Send to Friend | Bookmark Article Page 1 of 3  | Next »

Related Content
  • Testing Your Computer Security
  • How to Build a Small Network Using a Broadband Router
  • How to Share Folders and Printers on Your Network
  • Intel LaGrande Technology Explained
  • How to Build a Network Using a Cross-Over Cable

  • RSSLatest Content
    AMD A4-5000 CPU Review
    November 26, 2014 - 3:10 AM
    Samsung Galaxy Note Pro 12.2 Tablet Review
    November 25, 2014 - 3:00 AM
    ASUS X99-PRO Motherboard
    November 5, 2014 - 3:00 AM
    ASRock QC5000-ITX Motherboard
    November 4, 2014 - 3:00 AM
    Gigabyte X99-UD3 Motherboard
    October 30, 2014 - 8:30 AM
    ASUS X99-A Motherboard
    October 29, 2014 - 3:00 AM
    ASUS ZenFone 5 Smartphone Review
    October 15, 2014 - 7:00 PM
    ASUS AM1M-A Motherboard
    October 15, 2014 - 4:30 AM
    ASRock X99 Extreme4 Motherboard
    October 14, 2014 - 4:10 AM







    2004-14, Hardware Secrets, LLC. All rights reserved.
    Advertising | Legal Information | Privacy Policy
    All times are Pacific Standard Time (PST, GMT -08:00)