How to Inhibit Internet Hackers: Paano Iwasan ang Internet Hackers (click CC for subtitle)Articles . Blog
How to Inhibit Internet Hackers Internet worm is similar to internet virus. The internet virus sticks to another software or system to destroy data or architecture. But, internet worm is more distinct. In the Philippines, the term “brown out” is pretty typical. it happens when an electrical post gets broken due to certain causes. Factors include storm, short circuit, overloading of power, etc. Other areas may still have power, but, those affected don’t receive electricity. Brown out is just temporary electrical concern. But, there’s another issue that can happen. It’s blackout. This is the shutting down of power in a wider scope (whole state or country). Do you know what happened to New York and Toronto on August 14, 2003? A lot of people didn’t expect that blackout would happen. In a few seconds, telecommunication lines, water services, and other establishments got affected by the incident. The power lines shut down. 50 million people were harmed by the blackout. What was more alarming is that a lot of individuals got trapped in the elevator. Many experienced difficulty getting oxygen. Authorities rescued them. The blackout resulted into $6 billion worth of losses. Why did the power lines shut down? Some said that it’s because of neglected power lines and the trees got taller. But, some experts were looking for a more serious culprit. 3 days before the blackout, August 11, 2003, experts found an internet worm. It’s like an internet virus, Internet virus sticks to another system to destroy data and computer unit. But, internet worm is more distinct as it doesn’t need another system to destroy something. When the worm, which they called “blaster worm” attacked, a lot of essential establishments got affected. These include airline offices, railroad offices, etc. The power shut down costed numerous business owners tremendous amount of income losses. According to experts, the blaster worm can attack any computer unit as long as they are online. Who are the culprits? How can they be identified? What is an internet hacker? Internet hackers are characterized into three: white hat, black hat, and gray hat. White hats are experts who can create internet virus and worms. But, they chose to become the good guys. In other words, they are trusted because they help companies detect potential computer threats and stop further destruction. Black hats are people who don’t care about the welfare of the company that they hack. They destroy computer systems and gather essential information from their victims to gain money. Gray hats are those who are in the mid of the two types of hackers mentioned earlier. They can be the good guys, but there is a possibility for them to choose to be on the bad side if they value their personal interests. What to do for protection? #1. Do not visit suspicious or harmful websites. A lot of websites these days may appear normal and harmless. But, in fact, they have harmful codes or scripts that can be a threat to your computer. #2. Be vigilant when checking the email messages you are getting, especially to unknown senders. Hackers send email messages using valid name as sender. Their messages contain attachment that can harm your computer. Once your computer got infected, the hacker can get all the information he wants, which includes credit info, bank info, etc. #3. Install an anti-virus program or security protection on your computer unit. In cases that you need to go to a public internet shop to do a certain business, make sure that you log out from all of your accounts after doing your tasks. It’s also imperative that you clear the cache and cookies of the browser that you used.
Written by Michelle Gutierrez
- Melania Trump silent after husband mocks Greta Thunberg
- Love You Bangaram Telugu Full Movie | Rahul, Shravya | Sri Balaji Video
- Windows 10: Managing User Accounts and Parental Controls
- ZoomText Tech Support Tip #1 – ID#9 error when reading PDF Documents from the web
- Advanced Moving Filmstrip in Avid Media Composer
- FilterCopy | Comment Pe Comment – Funny Reactions to Social Media Comments
- Does Google use data from social sites in ranking?
- Cómo tener [WIFI GRATIS] desde cualquier lugar 2020 / Cómo tener INTERNET GRATIS/ FREE WIFI
- Why you should be Careful on The Internet