Share


Share

Share it !



share/bookmark
Showing posts with label Common. Show all posts
Showing posts with label Common. Show all posts

Some Common Network Security Problems


Computers that are connected to a network can be exposed to different problems than most stand alone systems. The network security problems these machines face can include risks posed by outside sources infiltrating the main network. These can come in the form of spy tactics, attacks on entire networks and users trying to exploit the system. When computers are connected to a main system all of the machines are vulnerable to these risks.

A user trying to exploit a system will transmit small bits of information over the shared connection. Once the entire package has been sent, the bits of data reassemble themselves to become an undetected program running in the background. This can cause systems to slow down or create interference for running certain programs. Some of these data programs are designed to kick in when a specific application is opened or installed.

Spying can also be referred to as eavesdropping and is something that occurs within network communications. In this procedure, the hacker or unauthorized party, simply taps into the system to copy data as it is transmitted. This process can work even when a system sends encrypted data, because there are tools designed to get through the encryption to expose the original data.

Another type of system attack is sometimes referred to as DoS. These initials stand for denial of service, which operates differently than the eavesdropping type pf attack. This procedure is designed to halt the operation of a network by blocking out its connections. This can occur when the system is hit with an enormous amount of traffic in a very short period of time. This attack usually focuses on Internet websites and servers. Once the system is down no one can connect to it.

Computer users might have heard of programs using backdoor operations. This is a process used to gain entry into a system without the authority or approval of the user. Programs designed to gain access to a computer in this manner often disguise themselves as other software programs the user will accept. This procedure works well on systems with no or very little security.

Most network security problems arise due to the way a particular system is designed. If the problems are anticipated in advance a system can be set up to detect and remove threats before they create problems. An existing system can often be redesigned to reduce or eliminate most of the risks involved in network systems.




Paul J James is a freelance writer who enjoys writing about all things technical. This includes Network Monitoring Tools that provide Application Performance Monitoring for large corporations.




The Most Common Internet Pitfalls


The Internet today is very popular and is being used in every nook and corner of the world. Internet has become so common and widespread that it has penetrated deeply into the everyday life of each and every individual. However, like all technologies, advantages and disadvantages do co-exist with each other.

The Internet has become so accessible and so huge in demand, that it is only befitting and timely to warn the common user about the shortcomings of this WWW technology. Unlike the physical world, the internet has no concrete methods to prevent misuse. Cyber Laws are at the most nascent stage and may take a long time to get established. In the meanwhile unscrupulous persons are taking advantage of the peoples' want for more technology.

The most common dangers associated with the Internet are spreading of rumors through email or blogs or social networking, dissemination of mischievous and malicious posts, stealing of vital personal and financial information and perpetration of frauds.

The trouble with internet is that many people of many different cultures access the globe are united together and these cultural divides do bring about issues. People who access the Internet often do so thinking they are secure. They don't realize how much people really know about them. When you access a site on the World Wide Web, you give away your IP address to the site. Your IP address is a unique number that identifies you when you are on the Internet. With this information, the site can find out your e-mail address, what ISP you use, where your ISP is located and some ISP s might also reveal where you re dialing from.

With your e-mail address the site might target you with constant e-mail advertisements. Web sites can also send out cookies to your computer. A cookie is a small text file which can hold information about which sites you visit as well as any other information that you supplied or the site discovered. Malicious users might use your IP address to exploit security holes in your web browser or in your operating system. These often crash your computer and in some cases they can access information on your computer s memory or hard drive.

With people depending on the internet for all their financial and business transactions, the risks are much more than stealing of information etc. Heavy financial loss can be the result if financial and business transactions are not carried out through properly encrypted websites with SSL.

Internet has more dangerous perils in hiding than the most treacherous jungles and the user needs to exercise caution, diligence and adherence to safety precautions in order not to fall into the traps and baits.

It is always advisable to install proper licensed Anti Virus programs, Anti-malware, scare-ware and adware protection etc to prevent unpleasant experiences.




Kannan Krishnamani (Nickname: Capricorn)




The Most Common Internet Pitfalls


The Internet today is very popular and is being used in every nook and corner of the world. Internet has become so common and widespread that it has penetrated deeply into the everyday life of each and every individual. However, like all technologies, advantages and disadvantages do co-exist with each other.

The Internet has become so accessible and so huge in demand, that it is only befitting and timely to warn the common user about the shortcomings of this WWW technology. Unlike the physical world, the internet has no concrete methods to prevent misuse. Cyber Laws are at the most nascent stage and may take a long time to get established. In the meanwhile unscrupulous persons are taking advantage of the peoples' want for more technology.

The most common dangers associated with the Internet are spreading of rumors through email or blogs or social networking, dissemination of mischievous and malicious posts, stealing of vital personal and financial information and perpetration of frauds.

The trouble with internet is that many people of many different cultures access the globe are united together and these cultural divides do bring about issues. People who access the Internet often do so thinking they are secure. They don't realize how much people really know about them. When you access a site on the World Wide Web, you give away your IP address to the site. Your IP address is a unique number that identifies you when you are on the Internet. With this information, the site can find out your e-mail address, what ISP you use, where your ISP is located and some ISP s might also reveal where you re dialing from.

With your e-mail address the site might target you with constant e-mail advertisements. Web sites can also send out cookies to your computer. A cookie is a small text file which can hold information about which sites you visit as well as any other information that you supplied or the site discovered. Malicious users might use your IP address to exploit security holes in your web browser or in your operating system. These often crash your computer and in some cases they can access information on your computer s memory or hard drive.

With people depending on the internet for all their financial and business transactions, the risks are much more than stealing of information etc. Heavy financial loss can be the result if financial and business transactions are not carried out through properly encrypted websites with SSL.

Internet has more dangerous perils in hiding than the most treacherous jungles and the user needs to exercise caution, diligence and adherence to safety precautions in order not to fall into the traps and baits.

It is always advisable to install proper licensed Anti Virus programs, Anti-malware, scare-ware and adware protection etc to prevent unpleasant experiences.




Kannan Krishnamani (Nickname: Capricorn)




ST06-002: Debunking Some Common Myths

There are some common myths that may influence your online security practices. Knowing the truth will allow you to make better decisions about how to protect yourself.

There is no one cause for these myths. They may have been formed because of a lack of information, an assumption, knowledge of a specific case that was then generalized, or some other source. As with any myth, they are passed from one individual to another, usually because they seem legitimate enough to be true.

While believing these myths may not present a direct threat, they may cause you to be more lax about your security habits. If you are not diligent about protecting yourself, you may be more likely to become a victim of an attack.

Author: Mindi McDowell Produced 2006 by US-CERT, a government organization. Terms of use US-CERTLast updated February 16, 2011

View the original article here