Beware of Hackers July 24th, 2007

What are the hackers?
The hackers are informatics passionate persons, which usually have a scope: “hack” codes, databases, web pages etc. They are considered offenders in the most of the World states. Their usually preferred aims are not the personal web pages, but the important systems with high protection and important information.

Once obtained, those files (information) are published on the Internet, just to be seen by everybody, or even used.
Any real hacker must respect a “hacker’s code”, which is preset and known to be respected.

Read the rest of this entry »

What Is A Computer Virus? : How You Can Protect Your PC! June 22nd, 2007

A computer virus is a program specially made to auto replicate and spread. It infects many computers, without a pre-agreement with the computer’s owner.

They spread by attaching to some programs like: .exe file, .com files, and recently to WORD, Excel, or even to HLP files. Some of the viruses can affect the boot sector of the HDD.

When an infected file is executed, or when the computer is started using an infected CD or diskette, the virus starts its work. Sometimes, the virus remains in the computer memory just to infect the next program to be run.

The dangerous viruses have the ability to execute some actions. Sometimes those actions are annoying (like the display of some response on a certain date and time, or as a feedback to an user action), or they can be very annoying – like slowing the computer performance. There are viruses that can cause a very big trouble, destroying files of data, documents or making the computer unusable.

Read the rest of this entry »

10 Recommendations For Your Computer Security June 15th, 2007

1. Take some time to learn about your computer security!

2. Buy yourself and use antivirus software that you can rely on. Choose an antivirus with a good background!

3. Choose a firewall solution. Like the antivirus, independent firewall software is the better solution. Some operating systems come with a firewall that can filter traffic. Use a firewall that can control Internet traffic in both ways – in and out.

Read the rest of this entry »