• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Hardware Secrets

Hardware Secrets

Uncomplicating the complicated

  • Case
  • Cooling
  • Memory
  • Mobile
    • Laptops
    • Smartphones
    • Tablets
  • Motherboard
  • Networking
  • Other
    • Audio
    • Cameras
    • Consumer Electronics
    • Desktops
    • Museum
    • Software
    • Tradeshows & Events
  • Peripherals
    • Headset
    • Keyboard
    • Mouse
    • Printers
  • Power
  • Storage
  • Video

Protecting Your Computer Against Invasions

Basic procedures to protect your computer from being attacked by hackers.

Home » Protecting Your Computer Against Invasions

Trojan Horses

Contents

  • 1. Trojan Horses
  • 2. File Sharing
  • 3. File Sharing (Cont'd)

With the popularization of broadband Internet connection, more and more users have their Internet connection active during all the time the computer is on. Even if you are not in fact accessing the Internet, the computer is connected. This way, such user tends to be more worried about invasions than the users who access the Internet through dial-up connections or users who don’t have access to the Internet.

To start with, it has to be understood that a hacker can only invade your computer if you “let” him/her do it. For instance, a hacker can only invade your computer using a backdoor like Netbus and Back Orifice if you have that type of program installed in the computer. That type of program transforms your computer in a server, making it possible for anybody in the world to invade your computer and read your files (with the appropriate tool, of course). But who is crazy enough to install a program like type in the computer? Nobody, of course. They usually come as “Trojan Horses”, that is, disguised as cool screen savers that a friend (a friend?) has sent you. Luckily, now all antiviruses recognize and remove that type of program, hence the importance of having an updated antivirus program in the computer.

Pay attention because nowadays Trojan Horses come in fake e-mails supposedly coming from banks and stock brokers. For example, in you have a checking account on Citibank and receives a fake e-mail saying that you should update your data and provides a direct link to do so, you might be tempted clicking on the link or even installing the software that may have come attached to this fake e-mail. DON’T DO SO! This link or software will steal your passwords and banking data! This technique, also known as phishing, is becoming more and more popular.

The best piece of advice? Don’t click on links nor install softwares that come from people you don’t know. Since a lot of people nowadays know about phising, people behind these scams are now sending e-mails saying that someone you love sent you an e-card or something like that, asking you to click on the provided link for you to read the lovely message. Don’t be silly, don’t click on these links! It’s a Trojan Horse!
 
But, besides Trojan Horses, what other type of procedure a common user may unintentionally perform which will let his/her computer become exposed to invasions? File sharing. Let’s explain more about this.

Continue: File Sharing

Networking Tutorials

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

As a participant in the Amazon Services LLC Associates Program, this site may earn from qualifying purchases. We may also earn commissions on purchases from other retail websites.

How to Avoid Scams on Facebook Marketplace Once and For All

Social media scams generate more than 770 million US dollars in losses in the US alone, and it’s … [Read More...] about How to Avoid Scams on Facebook Marketplace Once and For All

AMD EPYC from Zen1 to Zen4. How it will change the CPU market?

AMD, together with Intel, is one of the major processor manufacturers known in today's market. … [Read More...] about AMD EPYC from Zen1 to Zen4. How it will change the CPU market?

Valorant Phoenix Tips & Tricks You Have to Know

The Phoenix character in Valorant is one of the most amazing to play. Being aggressive, Phoenix will … [Read More...] about Valorant Phoenix Tips & Tricks You Have to Know

Footer

For Performance

  • About
  • Contact
  • Articles
  • Editorials
  • First Look
  • Reviews
  • Tutorials
  • Privacy

Everything you need to know

  • Everything You Need to Know About the Dual-, Triple-, and Quad-Channel Memory Architectures
  • What You Should Know About the SPDIF Connection (2022 Guide)
  • Everything You Need to Know About the Intel Virtualization Technology
  • Everything You Need to Know About the CPU Power Management

Copyright © 2023 · All rights reserved - Hardwaresecrets.com
About Us · Privacy Policy · Contact