Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud (e.g. phishing). Different methods have been used to protect the transfer of data, including encryption. If you are a newbie in Internet security, you have come to the right place. The following is information on some common terms used in Internet security. So next time you don’t have to scratch your head when someone uses these.
Firewall - is a system that acts as a barrier between your computer network and the Internet. A firewall controls the flow of information according to security policies.
Hacker - can be anyone specializing in accessing computer based systems for illegal purposes or just for the fun of it.
IP spoofing - is an attempt to access your system by pretending like another system. This is done by setting up a system with an IP address that you normally trust.
Sniffing - is the spying on electronic transmissions to access data. This mostly occurs in privately owned LAN networks connected to the web.
Trojan horse - a program pretending like useful software, while its actual strategy is to access, steal or destroy user data and access authorization. Apart from destroying information, trojans can also create a backdoor on your system for stealing confidential information.
Virus - is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware. To operate, viruses require the execution of the attached file.
Worm - A worm is almost similar to a virus, except that it doesn’t need the execution of any executable file to get activated. It can also replicate itself as it travels across networks.
So newbies, hope this post was helpful for you.
Do you have questions, comments, or suggestions? Feel free to post a comment!
Subscribe to:
Post Comments (Atom)
Total Pageviews
Popular Posts
-
Step-1 सबसे पहले आप www.blogspot.com खोले. Step-2 फिर Create Blog वाले Link पर क्लीक करे, अब जो पेज आएगा उसमें अपनी जीमेल की आईडी और पासव...
-
5 Ways To Build Your Own Social Networking Site 1.Ning: Ning is a popular online platform for users to create their own social websites a...
-
Shortcut Command Tab Move to a different section of the window Enter ...
-
Shortcut Command Tab Move to a different section of the window Enter ...
-
Signatures save your time by automatically appending your name at the end of the message. Not only name, you can insert your location, rich ...
-
Yahoo Messenger is one of the most user IM clients in the world, and many users use it for to IM at work, IM with friends and family and m...
-
Signatures save your time by automatically appending your name at the end of the message. Not only name, you can insert your location, rich ...
-
दोस्तों आज जो त्रिक्क में आपको आज बताने जा रहा हु, उससे आपको जानकर यह ख़ुशी होगी की आप भी आपने ब्लॉगर का पता बदल सकते हैं. उदहारण के लिए दे...
-
What is Network? A network or communication network is a system of interconnected communication devices that can communicate with one a...
-
दोस्तों आज जो त्रिक्क में आपको आज बताने जा रहा हु, उससे आपको जानकर यह ख़ुशी होगी की आप भी आपने ब्लॉगर का पता बदल सकते हैं. उदहारण के लिए दे...
Another Templates
Followers
Blog Archive
My Blog List
@amitrai. Powered by Blogger.
APNA ADDA
Popular Posts
-
5 Ways To Build Your Own Social Networking Site 1.Ning: Ning is a popular online platform for users to create their own social websites a...
-
After Huge Success of E-series business class mobile phones, now Nokia has planned to excite their user's with three new model of social...
-
Hey All Windows’ Users great news… Be prepare for your next PC desktop operating system refresh : Windows 8 Should be here in a couple ...
-
Yahoo Messenger is one of the most user IM clients in the world, and many users use it for to IM at work, IM with friends and family and m...
-
This tutorial will tell you how to hack yahoo messenger while you are engaged in chatting with some person. While you are chatting through y...
-
दोस्तों आज जो त्रिक्क में आपको आज बताने जा रहा हु, उससे आपको जानकर यह ख़ुशी होगी की आप भी आपने ब्लॉगर का पता बदल सकते हैं. उदहारण के लिए दे...
-
Step-1 सबसे पहले आप www.blogspot.com खोले. Step-2 फिर Create Blog वाले Link पर क्लीक करे, अब जो पेज आएगा उसमें अपनी जीमेल की आईडी और पासव...
-
Step-1 सबसे पहले आप www.blogspot.com खोले. Step-2 फिर Create Blog वाले Link पर क्लीक करे, अब जो पेज आएगा उसमें अपनी जीमेल की आईडी और पासव...
-
We know Samsung already developed device which can be work as an alternative to iPad device and which is already discussed in previous pos...
-
दोस्तों आज जो त्रिक्क में आपको आज बताने जा रहा हु, उससे आपको जानकर यह ख़ुशी होगी की आप भी आपने ब्लॉगर का पता बदल सकते हैं. उदहारण के लिए दे...
Category List
- Adult (1)
- Antivirus (1)
- Avast (1)
- CPU (1)
- Facebook (1)
- Facebook Tricks (1)
- Gaming (4)
- Gmail (1)
- google nexus (3)
- Google Tricks (1)
- Hack (2)
- Hotmail (1)
- HTC (3)
- Internet (3)
- LG (3)
- Micromax (3)
- Motorola (3)
- Network Hacking (1)
- Networking (3)
- Nokia (3)
- Nokia Mobile (3)
- Run (1)
- Samsung (3)
- Window XP (2)
- Windows (1)