2010年10月7日星期四
Internet attacks exponential
Viruses and Worms
The attacks are spreading exponentially through programs, quickly multiplying their numbers.
When a program, however, replied, speaking of worms, when attacking other programs, instead we talk about viruses.
The mathematics of their propagation is similar, and their distinction is not that important.
These programs thrive by exploiting bugs and common behaviors found in a large proportion of users or programs likely. They can spread worldwide within a few hours, potentially in a few minutes, and can cause devastating economic losses are spread over a 'larger community.
Reducing the risks
There are several ways to minimize the possibility of taking a virus. By definition, the least common is to stay out of the monoculture of the people. If you write your own operating system and applications, it is unlikely that you come infected. Microsoft Windows systems have traditionally hosted the vast majority of viruses, which means that Macintosh and Linux users have suffered less. But the situation is changing, especially for Linux users. Worms appeared to Linux and even multi-platform, which can spread via direct access to the network, as well as through Web pages and e-mail. If you do not communicate with a host infected, you can not catch the virus. An accurate control network access and file obtained from 'outside can drastically reduce the risk of being infected.
Keep in mind that there are also a number of viruses propagated by man, as is the case in which people forward messages (containing urban legends) to all their friends, inviting them to do the same. All this usually results in a nuisance, but can cause panic in individuals with little knowledge of computers. Some contain false messages that the recipient's computer is infected. In one case, the message was accompanied by information to delete a critical file systems, many people have damaged their machines by following these instructions.
Therefore, not only the threats of the network, but also the user's misconduct may cause the compromise of a machine.
More Informations ?
>> ThinkPad t400 battery
>> Dell xps m1210 battery
>> ThinkPad x200 battery
>> Dell latitude d800 battery
>> Lenovo Thinkpad t61 Battery
订阅:
博文评论 (Atom)
没有评论:
发表评论