The Cyber Crime
In accordance with its name, which means spy and spy ware, which means the program, the spyware who fall into these categories of malicious software, was created in order to spy on the computers we use. Of course, in accordance with the character and nature of a spy, it was all done without the knowledge of the owner. After obtaining the data from the monitoring results, the spyware will be reported activities that occur on the PC to a third party or the maker of spyware.
Spyware was originally not dangerous because it does not damage data as well as by a virus. Unlike a virus or worm, spyware do not breed and does not spread itself to other PCs in the same network. However, in line with developments in technology and sophistication of human reason, which was originally only tangible spyware or banner ads with a view to a profit per se, now turned into one of the media are damaging, even tends to be detrimental.
Based on the type of disruption ditimbulkannnya, it appeared the names of this type of spyware. Here are some names of spyware.
This program is usually a form of advertising which is inserted in secret by programmers and appear suddenly. Typically programs are free, but the user should receive compensation for ads on the program.
Browser Helper Object
Browser Helper Object (BHO) is a hijacker that displays a link on the toolbar. Generally BHO spy activities to record the activities netter, in addition to the browser view us, add a special toolbar.
Our browser forcibly inserted into a particular link and forcing us to go on a particular site even though we have correctly typed the site's domain address we are headed. This means that the browser program that we use has been indirectly hijacked and redirected to a specific site.
Works include an automatic function for the Internet connection. Although we do not make an internet connection, secretly own the program can be active. The impact could result in material losses as a phone bill that had suddenly swollen.
Automatically install a program without knowledge of the owner of the computer. This usually exploit the weaknesses in old versions of internet explorer.
This is most often committed by malware authors. By changing the default browser homepage address and can not be changed even though we've been doing re sets.
Through a program that is accessed, the keylogger to record what we type and send data to the server malware authors. This program can be detrimental if the necessary data that we possess or store in kompter can be known.
The control is carried out a search engine on the browser. When one writes an address, the program usually displays so many pop up ads that are not known.
One program that is harmful to the way record activities on a computer, including critical data, passwords, and others. The program is very smart and only send data after a user completes an activity.
Functioned to direct visitors to the site to other sites that they want.
Dukung Terus Pendidikan bagi semua anak dengan Subscribe melalui Email anda.
0 komentar for this post
Tinggalkan Komentar Anda dibawah ini
Jika Anda mempunyai pertanyaan, harap sampaikan di kolom komentar ini,agar kami bisa langsung merespon, bukan di komentar isian Facebook.
Harap jangan berkomentar yang bersifat spam, jangan meninggalkan komentar yang berbau sara, kata-kata kotor, atau yang bersifat nada keras atau komentar Anda akan kami HAPUS. Blog ini auto aprove DO-FOLLOW. Kami sungguh menyukai perdamainan. PIECE ......
Loading Lambat ??? Klik versi mobile :EDUCATION FOR OUR COUNTRY - PENDIDIKAN UNTUK NEGERI KITA: The Cyber Crime
- ► 2012 (16)
- ► 2011 (87)
- 1000 cara untuk meningkatkan peringkat Alexa
- Teknik Impact dengan GERAKAN
- Berbicaralah ke Semua Bagian Otak ( Re-called Brai...
- Trik Penggunaan Perintah/Aba-aba Untuk Mengajar
- Beberapa Jenis Berpikir adalah Kecocokan Terbaik U...
- WARNING !!! Starone ,Customer Servisnya, Fiturnya ...
- PERMASALAHAN PROSES BELAJAR MENGAJAR BAHASA INDONE...
- Teko Kekhawatiran
- Islam dan Dinosaurus ??
- MEMBUAT “MEREKA” LEBIH MEMAKNAI BELAJARNYA.
- 10 TRIK AMPUH BELAJAR MATEMATIKA
- Kompetensi Kepala Sekolah Menurut Peraturan Mente...
- Belajar Antar Satu Sama Lain
- LAMPIRAN PERATURAN MENTERI PENDIDIKAN NASIONAL NOM...
- UN Gagal ? Siswa Gagal ? Guru Gagal ? Atau Pemerin...
- UN gagal, 1.700 kepsek latihan kompetensi
- Kompetensi Kepala Sekolah Menurut Para Ahli
- WELCOMING SCHOOL FOR ALL CHILDREN
- Are You Dreaming to Learning In French ?
- What is "Working memory" ?
- Samsung GT-S5233 Star , Jual VGA ATI RADEON (GIGAB...
- The Cyber Crime
- LEARNING MODEL OF P.O.E (PREDICT - OBSERVE - EXPL...
- ▼ May (23)