There are a lot of ports in your PC which are vulnerable to attack from a hacker. These ports are used to communicate internally with your monitor or printer or externally to the internet. For example, Port 25 is used for receiving incoming email and Port 80 is used to connect to the internet.
In addition you have a unique IP number which is assigned to your computer by your Internet Service Provide which is required for you to use the internet. You are able to send and receive information because of this. This would also serve as your computer's address. The IP number looks like this - 106.185.21.243. If you have a broadband or DSL connection your IP address rarely changes which make your computer more vulnerable. If you connect to the internet via dial up then you typically are assigned a new IP address every time you log on, but this doesn't been you are not vulnerable to attack! There is another issue and that's with broadband connection you are likely to be on line for longer periods of time giving hackers more opportunity to attack you.
Hackers use "port scanning" software to hunt for for vulnerable computers with open ports using your computer's IP address. What they will do is send malicious programs through these open ports onto your computer.
Sending out Trojan Viruses disguised as email attachments is another common way that hackers use to gain control of your computers. What hackers would typically do is send out these messages to 1000s of users with enticing headings and an attachment which they are hoping you will open . The virus loads itself onto your computer and allows the hacker to control your computer when the attachment is opened.
Also, hackers would bundle Trojan viruses into free downloads like screensavers which are commonly installed on home user's machines. There are illegal P2P networks that circulate large numbers of infected files.
Here are tips that you may want to consider
You should be receiving the latest Window's updates. Make sure you have a good firewall installed. Aside from installing a spyware removal tool, you should also get the spyware definitions up to date. At least once a week, run a scan or you can also do it after being on line for a long period of time. When you install an anti virus program, be sure that the virus definitions are up to date. At least once a week, you should carry out a virus scan. Use a Spam Filter to stop dangerous email
Further actions you can take.
If suspicious looking email messages have attachments, then don't open them. Be careful what free software you download. Downloading from reputable sites is the only way to go. Remember that if you are away from your computer for a long period of time, then switch off your broadband connection. Get into the habit of switching your computer and broadband connection off at night time. This is relevant especially when it comes to wireless network users.
In addition you have a unique IP number which is assigned to your computer by your Internet Service Provide which is required for you to use the internet. You are able to send and receive information because of this. This would also serve as your computer's address. The IP number looks like this - 106.185.21.243. If you have a broadband or DSL connection your IP address rarely changes which make your computer more vulnerable. If you connect to the internet via dial up then you typically are assigned a new IP address every time you log on, but this doesn't been you are not vulnerable to attack! There is another issue and that's with broadband connection you are likely to be on line for longer periods of time giving hackers more opportunity to attack you.
Hackers use "port scanning" software to hunt for for vulnerable computers with open ports using your computer's IP address. What they will do is send malicious programs through these open ports onto your computer.
Sending out Trojan Viruses disguised as email attachments is another common way that hackers use to gain control of your computers. What hackers would typically do is send out these messages to 1000s of users with enticing headings and an attachment which they are hoping you will open . The virus loads itself onto your computer and allows the hacker to control your computer when the attachment is opened.
Also, hackers would bundle Trojan viruses into free downloads like screensavers which are commonly installed on home user's machines. There are illegal P2P networks that circulate large numbers of infected files.
Here are tips that you may want to consider
You should be receiving the latest Window's updates. Make sure you have a good firewall installed. Aside from installing a spyware removal tool, you should also get the spyware definitions up to date. At least once a week, run a scan or you can also do it after being on line for a long period of time. When you install an anti virus program, be sure that the virus definitions are up to date. At least once a week, you should carry out a virus scan. Use a Spam Filter to stop dangerous email
Further actions you can take.
If suspicious looking email messages have attachments, then don't open them. Be careful what free software you download. Downloading from reputable sites is the only way to go. Remember that if you are away from your computer for a long period of time, then switch off your broadband connection. Get into the habit of switching your computer and broadband connection off at night time. This is relevant especially when it comes to wireless network users.
No comments:
Post a Comment