Wednesday, March 28, 2012

Threats To Internet





Introduction

We all are using Internet for various purposes likedownloading movies, games etc.
People all over the world are using internet. Out of the total population of the world, there will be only a less prepositionof people who are not using Internet. But for those who are using Internet without proper security, there will be a good hunter for cracking their connection which can be called as spywares. Spam, Rootkits, Zombies and all others are waiting for such people. We will have a feeling of living in hell if they hadentered our computer. These spywares may lay clever trap for damaging our computer. Onlysolution for this is using a good Internet Security Suite. Now, we can discuss about some internet threat that are faced by us today.


 Rootkits.
 Zombies.
 Browser Hijacker.
 Spam.
 Spware.
 Mouse Traping.
 Phishing.




Rootkits


Rootkits means a collection of several programmes. These rootkits may find a space inside our system files and appear hidden and affects our computer very badly. Rootkits enable administrator level to access a computer. Hackers those who are sending these rootkits to our system can control our system. They can hack our passwords and valuable data through thistechnique. Rootkits was introduced in Sun and Linux OS in 1990. But now, rootkits may be present in most of the operating systems like windows.


Zombies  


Zombies are just a computer. It is also known as drone. In this, hacking tool is highly compressed and it is controlled by a third-party programme. First, these zombies will enter a trojan virus to our computer and it will open a back-door to access to our computer. In this way, they can leak our passwords and other valuable datas. Normally, zombies enters our system through e-mails.


Browser HiJacker


Browser Hijacker is a malware programme that normally affects our browser. These type of malwares redirect our browser to special site. It will also cause errors on your home-page. These malwares can edit our registry and they will start running automatically whenever we restarts our computer.


Spam


Junk or bulk e-mail is known as a spam. It is mainly aiming at advertising field. In these e-mails, they will show captions like “ Earn $650 in your house”, “You have got $80000 as the European bonanza bumper prize”. From these messages, the hacker ir trying to get your personal information. As an average, a person gets 100 spams daily.


Mouse Trapping


If we enter a site, our mouse will stops moving, it will forces us to stay on that site for a long time. It will also disables “back”, “close” options on our browser.


Phishing


Phishing is an old style hacking technique. But this type of hackinh is still alive. It was first documented in 1996. Phishing attack is commonly done through e-mails.


Conclusion


In this post, we had discussed about the threats of Internet. Only solution is good Internet Security Suite. Reviews about best Internet Security Suites will be posted soon.

No comments:

Post a Comment