Powered By Blogger

martes, 2 de junio de 2015

Security On The Internet


Malware, Spy Software and Pishing


Malware.
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware," which is a good way to remember it (even if you're not Spanish).


Spy Software and Pishing.
-Spyware, also called adware, is software that is hidden on your computer that gathers personal information about you and your Internet use habits. The software then relays it to advertisers, marketing groups and others who use the information to target you with pop-up ads.

-Phishing scams are a relatively new form of Internet fraud that are becoming increasingly prevalent. This high-tech scam uses spam or pop-up messages to trick users into disclosing credit card numbers, bank account information, Social Security number or other confidential information.

Keyloggers.
A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Website URLs you visit. Keyloggers, as  a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third person.


What are crackers and hackers?
A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things. Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find vulnerabilities in systems. These hackers are also known as white hat hackers.  Crackers’ motivations can range from profit, a cause they believe in, general maliciousness or just because they like the challenge. They may steal credit card numbers, leave viruses, destroy files or collect personal information to sell.


Crackers can also refer to those who reverse engineer software and modify it for their own amusement.  The most common way crackers gain access to networks or systems is through social engineering, whereby the cracker contacts employees at a company and tricks them into divulging passwords and other information that allows a cracker to gain access.


The Punisher Shield

Our antivirus provides real-time protection for your computer. Updates its virus database daily to ensure maximum protection against online threats (viruses, spyware or rootkits).

It has other ways of scanning for viruses but not to optimize and improve the performance of your PC. A feature of the program allows to analyze the PC for software without updating. Other recent features enable correct performance deficiencies and scan your local network for security flaws in your WiFi in the connected devices or on your router.

To help with the analysis, the 2015 version of our antivirus includes the Smart Scan option, which meets in the same function all individual analysis.

This includes a wide range of tools for different tasks. So, The Punisher Shield may be considered more a multifunctional program tat is not a simple antivirus. Avast Premier proposes a function for cleaning browsers, VPN Secure Line (VPN service) SafeZone (an environment safe and private browsing to, for example, shopping, bank), Sandbox (to run programs in an environment virtual and avoid risks), remote troubleshooting.

Finally, many settings can be changed to customize the configuration of The Punisher Shield, and you also have usage statistics, personal and global.



No hay comentarios:

Publicar un comentario