Online security: 80 steps of defense for NET users - Part 4

Spyware and spyware today are not only a frustrating concern but have become a security and privacy threat. These software also contribute to opening c

Online security: 80 steps of defense for NET users - Part 4 Picture 1Online security: 80 steps of defense for NET users - Part 4 Picture 1 10. Block websites that contain spyware

Spyware and spyware today are not only a frustrating concern but have become a security and privacy threat. These software also contribute to opening the system for cyber criminals to steal personal information on users' computers. These types of software are not only more and more dangerous when they are "embedded" in web pages or the ability to automatically install on users' computers without asking permission. So we should be careful when visiting these websites and it is best to block websites.

With Internet Explorer, you can use the Tools | feature Internet Options | Privacy to block or allow a certain website. However, the trick is to be aware of which websites have spyware and adware unless you have once visited the site and suffered severe attacks.

Alternatively, you can use IE-Spyad to add trusted sites that are always allowed by IE to run programming code or ActiveX engines. This is a collection of highly reliable websites that are stored as .REG files and when users merge files and the computer's Registry system, websites containing spyware and adware will added to Internet Explorer.

You can download IE-Spyad here . This is a self-extracting file format so you just need to double-click the file to extract itself and then find it then run the 'ie-ads.reg' file. To check, you can go to Tools | Internet Options | Security. Click on Restricted Sites and click Sites button, you will see a list of trusted websites there.

11. 'Abduction' browser

The 'kidnapping' of your browser is one of the most common illnesses in home or business users - this type of attack is more common than using computer viruses and worms. The 'kidnapping' browser today seems to have fallen into the 'forgotten darkness' that exists between adware, spies or other malicious code.

The purpose of browser abduction is to direct users to a search engine that is completely different from what users usually use. For example, you want to go to google.com but you are 'kidnapped' to a strange search page even though you entered the correct Google.com address. The browser 'kidnapping' like this is aimed at advertising. However, there are still some specialized kidnappers who use trojans or backdoors to force users to download keyloggers . to steal data on users' computers.

Sadly, there is no fixed method to remove such software. Each software has a different type of 'kidnapping' with quite complex techniques - from websites that use JavaScript to change your default homepage to change the registry settings so that every time you forget to type HTTP it will immediately redirect you to a completely different site that requires your access.

The best way to avoid being kidnapped is to be vigilant. Most cases of browser abduction are through power delivery and user interaction. When a user visits a website and encounters a pop-up-style ad asking if they want to download a special software for free or anything . if you answer is 'No' is probably not a problem and if it is 'Yes' then you must have been 'kidnapped'.

Finally, there are some situations when kidnapping a browser using a method of exploiting a security hole in the browser. This situation is more annoying so you should always update the latest patches.

12. Purchase software for password cracking

What a satire. But sometimes for security purposes you also need to hack into a computer or program. Or do you often forget your password .? There are many other situations that make us think about these types of software.

The solution here is the password cracking software. Using these types of software will save you time. You can refer to the software at http://www.lostpassword.com/, which sells a lot of password cracking software for different applications.

Articles posted:
Online security: 80 defensive steps for NET users - Part 3
Online security: 80 steps of defense for NET users - Part II -
Online security: 80 steps of defense for NET users - Part I -

4 ★ | 1 Vote