October 21, 2010

Safe Computing

What You Need to Know to Avoid Identity Theft
Introduction to Safe Computing
What You Need to Know to Avoid Identity Theft

Home computers are a popular target for intruders. This is due to the fact that home computers usually use less complex protection and take less work and risk to penetrate than the systems within a secure enterprise network. This is not to say that in the past, hackers haven’t also provided equal headaches for the security administrators in big enterprises, exploiting every possible opportunity to sneak in. The attackers look for credit card numbers, bank account information, and anything else they can find from your home computer. But it’s not just the money-related information they’re after. Intruders also want the compromised computer’s resources, to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to figure out where the attack is really coming from.

Not many of the home computer users are aware of the security issues that can arise out of unsafe computing practices, unless they experience an attack on their computers. When combined with high-speed Internet connections that are always turned on, intruders can quickly find and then attack home computers. While intruders also attack home computers connected to the Internet through dial-up connections, high-speed connections modems and DSL modems) becomes a favored target. As we have discussed earlier, attackers use various methods such as attaching a virus in an email, to enter or access the home computers. They also take advantage of vulnerabilities in the computer’s programs code to gain access.
What You Need to Know to Avoid Identity Theft

What follows are some tips to help provide a more secure computing experience.


0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...

Search This Blog

Followers

Categories

Twitter Delicious Facebook Digg Stumbleupon Favorites More